Files
nuclei-templates/http/fuzzing/wordpress-plugins-detect.yaml

54 lines
1.2 KiB
YAML
Raw Normal View History

2021-04-20 06:21:49 +05:30
id: wordpress-plugins-detect
2021-10-10 06:43:30 +05:30
2021-04-20 06:21:49 +05:30
info:
name: WordPress Plugins Detection
author: 0xcrypto
severity: info
metadata:
max-request: 100564
tags: fuzz,wordpress,fuzzing
2021-04-20 06:21:49 +05:30
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
words:
- "wp-content"
- "WordPress"
- "wordpress"
condition: or
internal: true
- raw:
- raw:
2021-04-20 06:21:49 +05:30
- |
GET /wp-content/plugins/{{pluginSlug}}/readme.txt HTTP/1.1
Host: {{Hostname}}
2021-04-20 14:13:28 +05:30
payloads:
pluginSlug: helpers/wordlists/wordpress-plugins.txt
2021-04-20 14:13:28 +05:30
matchers-condition: and
2021-04-20 06:21:49 +05:30
matchers:
- type: status
status:
- 200
2021-04-20 14:13:28 +05:30
- type: word
words:
- "== Description =="
extractors:
- type: regex
part: body
group: 1
regex:
- "===\\s(.*)\\s===" # extract the plugin name
2023-10-14 16:57:55 +05:30
- "(?m)Stable tag: ([0-9.]+)" # extract the plugin version
2025-07-21 18:24:16 +00:00
# digest: 4a0a004730450221008c06e0f02f3ae99cbe2afd234a86bef00dec97074e69bb185e3e3f3c711b5eba0220582d5fccaf06621f3e4eb8529a97251e04984f360c32507857b41c3cb540bd94:922c64590222798bb761d5b6d8e72950