Files
nuclei-templates/http/vulnerabilities/wordpress/wpdm-cache-session.yaml

32 lines
795 B
YAML
Raw Normal View History

2021-06-13 17:43:24 +05:30
id: wpdm-cache-session
info:
name: Wpdm-Cache Session
author: dhiyaneshDk
severity: medium
2024-01-02 21:15:12 +05:30
description: Leaked session of Wpdm Cache wordpress plugin.
reference:
- https://www.exploit-db.com/ghdb/7004
metadata:
max-request: 1
tags: wordpress,edb,vuln
2021-06-13 17:43:24 +05:30
http:
2021-06-13 17:43:24 +05:30
- method: GET
path:
- '{{BaseURL}}/wp-content/uploads/wpdm-cache/'
2023-10-14 16:57:55 +05:30
2021-06-13 17:43:24 +05:30
matchers-condition: and
matchers:
- type: word
words:
- "Index of /"
- ".txt"
2021-06-13 20:56:28 +05:30
- "wpdm-cache"
2021-06-13 17:43:24 +05:30
condition: and
part: body
2023-10-14 16:57:55 +05:30
2021-06-13 17:43:24 +05:30
- type: status
status:
- 200
2025-10-26 16:17:34 +00:00
# digest: 4a0a00473045022100d441aa915d512a7f5f8d120dee975274f9f39c61b124726d0f8296e5612f82e702206c59fd25263b3e257e37f35487993df83018c7694d5d13c7bc0fac5a6e3766ac:922c64590222798bb761d5b6d8e72950