Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-debug-log.yaml

50 lines
1.1 KiB
YAML
Raw Normal View History

2020-08-30 12:41:22 -03:00
id: wp-debug-log
info:
2023-12-07 23:55:03 +07:00
name: WordPress Debug Log - Exposure
author: geraldino2,dwisiswant0,philippedelteil
2020-09-20 18:27:43 +05:30
severity: low
2024-01-02 21:15:12 +05:30
description: Exposed Wordpress debug log.
metadata:
2023-12-07 23:55:03 +07:00
max-request: 4
tags: wp,wordpress,log,exposure
2020-08-30 12:41:22 -03:00
http:
2020-08-30 12:41:22 -03:00
- method: GET
path:
2023-12-07 23:55:03 +07:00
- "{{BaseURL}}/{{paths}}/debug.log"
payloads:
paths:
- 'wp-content'
- 'wordpress'
- 'wp'
- 'blog'
2023-11-29 18:41:38 +05:30
stop-at-first-match: true
host-redirects: true
max-redirects: 3
max-size: 5000
2020-08-30 21:27:24 +05:30
matchers-condition: and
2020-08-30 12:41:22 -03:00
matchers:
- type: word
2023-12-07 23:55:03 +07:00
part: header
2020-08-30 12:41:22 -03:00
words:
- octet-stream
- text/plain
condition: or
2021-07-24 00:06:13 +05:30
- type: regex
2023-12-07 23:55:03 +07:00
part: body
regex:
- "[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP"
2021-07-24 00:06:13 +05:30
2020-08-30 12:41:22 -03:00
- type: status
status:
2023-10-14 16:57:55 +05:30
- 200
2023-11-29 18:41:38 +05:30
extractors:
- type: dsl
dsl:
- to_string(content_length)+ " bytes"
2024-12-01 13:57:55 +00:00
# digest: 490a00463044022040efbeedc82d9d94480ea18ce5f1e102cda95fa01dc99e5aedb1d939447c22e702203605546a92c3dd4a5f3f431b90a29661f6546a20a77e81874238de7dc2a0b01d:922c64590222798bb761d5b6d8e72950