Skip to content
Open
Show file tree
Hide file tree
Changes from 19 commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions docs/Modules.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,6 +163,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
- '**ProFTPd_restriction_bypass_vuln**' - check ProFTPd for CVE-2009-3639
- '**server_version_vuln**' - check if the web server is leaking server banner in 'Server' response header
- '**smartermail_cve_2026_24423_vuln**' - check the target for SmarterMail CVE-2026-24423 vulnerability
- '**solarwinds_whd_cve_2025_40536_vuln**' - check SolarWinds Web Help Desk vulnerable version via build token
- '**sonicwall_sslvpn_cve_2024_53704_vuln**' - check the target for SonicWALL SSLVPN CVE-2024-53704 vulnerability
- '**ssl_signed_certificate_vuln**' - check for self-signed & other signing issues(weak signing algorithm) in SSL certificate
- '**ssl_expired_certificate_vuln**' - check if SSL certificate has expired or is close to expiring
Expand Down
58 changes: 58 additions & 0 deletions nettacker/modules/vuln/solarwinds_whd_cve_2025_40536.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
info:
name: solarwinds_whd_cve_2025_40536_vuln
author: Nettacker Team
severity: 8.1
description: |
Identifies SolarWinds Web Help Desk instances
by analyzing response content and extracting
the embedded build version token from resource URLs.
The detected version is evaluated against the patched
threshold (12.8.8 HF1) to determine potential exposure.
This enables passive and safe identification of systems affected by the security control bypass vulnerability.
reference:
- https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536
- https://nvd.nist.gov/vuln/detail/CVE-2025-40536
profiles:
- vuln
- http
- high_severity
- cve2025
- cve
- cisa kev
- solarwinds
- webhelpdesk
- passive

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
Host: "{target}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/helpdesk/WebObjects/Helpdesk.woa"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443

response:
condition_type: and
conditions:
status_code:
regex: "200"
reverse: false
content:
regex: "(?s)(?=.*(Web Help Desk Software|SolarWinds WorldWide|/WebObjects/Helpdesk\\.woa))(?=.*\\?v=12_(?:[0-7]_[0-9]+|8_(?:[0-8])_[0-9]+)_[0-9]+)"
reverse: false
Loading