Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-user-enum.yaml

33 lines
792 B
YAML
Raw Normal View History

2021-07-10 21:54:31 +05:30
id: wordpress-user-enum
info:
name: Wordpress User Enumeration
author: r3dg33k
severity: info
2024-01-02 21:15:12 +05:30
description: This template detects user enumeration in wordpress.
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: wordpress
2021-07-10 21:54:31 +05:30
http:
2021-07-10 21:54:31 +05:30
- method: GET
path:
- "{{BaseURL}}/?author=1"
matchers-condition: and
matchers:
- type: regex
regex:
- '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+'
part: header
2023-10-14 16:57:55 +05:30
2021-07-10 21:54:31 +05:30
- type: status
status:
- 301
extractors:
- type: regex
part: header
regex:
- 'author\/\w+'
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022100890f23f0c8843c6a3851ed4e449a57a71d35500f36ad4fe2a7e8e1e7e3d10a310220094c4d72920c070aea852701dbd90465e16b51aabb08f7e932aeb7e4446dad02:922c64590222798bb761d5b6d8e72950