Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml

43 lines
964 B
YAML
Raw Normal View History

2021-11-04 15:43:49 +05:30
id: wordpress-rdf-user-enum
2021-10-30 13:46:56 +03:00
info:
name: Wordpress RDF User Enumeration
2021-10-30 13:46:56 +03:00
author: r3dg33k
severity: info
2024-01-02 21:15:12 +05:30
description: Leaked Wordpress RDF leads to User Emumeration.
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: wordpress,enum
2021-10-30 13:57:53 +03:00
http:
2021-10-30 13:46:56 +03:00
- method: GET
path:
- '{{BaseURL}}/feed/rdf'
2023-10-14 16:57:55 +05:30
host-redirects: true
2021-10-30 13:46:56 +03:00
matchers-condition: and
matchers:
2021-11-01 15:30:54 +05:30
- type: word
part: header
words:
- "application/rdf+xml"
- type: word
part: body
words:
- "<rdf:RDF"
- "<dc:creator>"
condition: and
2021-11-01 15:33:06 +05:30
2021-10-30 13:46:56 +03:00
- type: status
status:
- 200
2021-10-30 13:57:53 +03:00
2021-10-30 13:46:56 +03:00
extractors:
- type: regex
part: body
2021-11-01 15:30:54 +05:30
group: 1
2021-10-30 13:46:56 +03:00
regex:
2021-11-04 15:43:49 +05:30
- '<dc\:creator><\!\[CDATA\[(.*?)\]\]></dc'
2024-12-01 13:57:55 +00:00
# digest: 4a0a0047304502207632fd44ca378bbf59e176a8c8425fb67a24af24b88eee0a8976556b7aa271e1022100d799fe266806647f745dcd0d6cdaf5e3d9f8b09f81ea4151e2095707ad3780bb:922c64590222798bb761d5b6d8e72950