Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-emergency-script.yaml

32 lines
912 B
YAML
Raw Normal View History

2020-09-08 22:53:54 +07:00
id: wordpress-emergency-script
info:
name: WordPress Emergency Script
author: dwisiswant0
severity: info
2024-01-02 21:15:12 +05:30
description: Exposed wordpress password reset emergency script.
reference:
- https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: wordpress
2020-09-08 22:53:54 +07:00
http:
2020-09-08 22:53:54 +07:00
- method: GET
path:
- "{{BaseURL}}/emergency.php"
2020-09-20 18:27:43 +05:30
2020-09-08 22:53:54 +07:00
matchers-condition: and
matchers:
- type: word
words:
- "Your use of this script is at your sole risk"
- "WordPress Administrator"
- "Update Options"
condition: and
part: body
2023-10-14 16:57:55 +05:30
2020-09-08 22:53:54 +07:00
- type: status
status:
2023-10-14 16:57:55 +05:30
- 200
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022100871f29c60bd51d9ccb15ed7d5b8ec28b39dc358f94a50cf2cbdccc99d2da1f7202204cddb2d71194bf06ca3c537d724928a597fe74be0f3cf52c0ee0e9ffb6c88c8e:922c64590222798bb761d5b6d8e72950