2022-09-08 09:28:46 -04:00
id : wordpress-upload-data
2022-04-22 13:38:41 +03:00
2022-09-08 09:28:46 -04:00
info :
name : wordpress-upload-data
author : pussycat0x
severity : medium
description : The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it.
2025-10-10 17:29:45 +07:00
reference :
- https://www.exploit-db.com/ghdb/7040
2023-04-28 13:41:21 +05:30
metadata :
max-request : 1
2025-10-17 14:17:02 +02:00
tags : wordpress,listing,vuln
2022-04-22 13:38:41 +03:00
2023-04-27 09:58:59 +05:30
http :
2022-09-08 09:28:46 -04:00
- method : GET
path :
- "{{BaseURL}}/wp-content/uploads/data.txt"
matchers-condition : and
matchers :
- type : word
words :
- "admin:"
- type : word
part : header
words :
- "text/plain"
- type : status
status :
- 200
2025-10-31 05:32:04 +00:00
# digest: 490a004630440220432e37581c1a3606b5d121414234742f90edaf33014d1d19a8f3a242f501369c02203eb22ac0606210d97a7a3e5242cf7be9ea389f238344f052caf9324e70d32a3f:922c64590222798bb761d5b6d8e72950