2022-09-08 09:28:46 -04:00
id : wordpress-upload-data
2022-04-22 13:38:41 +03:00
2022-09-08 09:28:46 -04:00
info :
name : wordpress-upload-data
author : pussycat0x
severity : medium
description : The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it.
reference : https://www.exploit-db.com/ghdb/7040
2023-04-28 13:41:21 +05:30
metadata :
max-request : 1
2023-10-14 16:57:55 +05:30
tags : wordpress,listing
2022-04-22 13:38:41 +03:00
2023-04-27 09:58:59 +05:30
http :
2022-09-08 09:28:46 -04:00
- method : GET
path :
- "{{BaseURL}}/wp-content/uploads/data.txt"
matchers-condition : and
matchers :
- type : word
words :
- "admin:"
- type : word
part : header
words :
- "text/plain"
- type : status
status :
- 200
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022079adc01aecf82dbee2f9533069c9bf55c60736b63b530c3be80da0a62ed0c8c2022100ec141b6a940f1a7e5065aebf77e5aa928a924bd243e5f1aa48670b0c01d0517b:922c64590222798bb761d5b6d8e72950