Files
nuclei-templates/http/vulnerabilities/wordpress/wp-enabled-registration.yaml

26 lines
875 B
YAML
Raw Normal View History

2021-01-21 20:17:20 +05:30
id: wp-enabled-registration
info:
name: WordPress user registration enabled
2024-12-08 10:08:10 +05:30
author: Ratnadip Gajbhiye,ritikchaddha
2021-01-21 20:17:20 +05:30
severity: info
metadata:
max-request: 1
2023-10-14 16:57:55 +05:30
tags: wordpress
http:
- method: GET
path:
- '{{BaseURL}}/wp-login.php?action=register'
2024-12-05 23:24:53 +05:30
- '{{BaseURL}}/wp-signup.php'
2021-01-21 20:17:20 +05:30
2024-12-05 23:24:53 +05:30
host-redirects: true
2024-12-08 10:08:10 +05:30
max-redirects: 4
matchers:
2024-12-05 23:24:53 +05:30
- type: dsl
dsl:
2024-12-08 10:08:10 +05:30
- 'contains_any(body, "Register For This", "register_form_message", "registerform", "signup-form", "signup_form", "login-action-register","-register")'
- 'contains_any(body, "/wp-includes", "/wp-content")'
2024-12-05 23:24:53 +05:30
- 'status_code == 200'
2021-03-10 19:33:49 +05:30
condition: and
2024-12-09 07:26:12 +00:00
# digest: 4b0a00483046022100f9ddeb2cbd5ccb0aa27ab4eab3dee915ef5231aeb68d9a3795619a5d43672c7d022100ae0d9a459aa044232f1b490aba3be59ab0b29e7992006a12c36f0b38c113bf44:922c64590222798bb761d5b6d8e72950