Files
nuclei-templates/http/vulnerabilities/wordpress/wp-user-enum.yaml

64 lines
2.1 KiB
YAML
Raw Normal View History

id: wp-user-enum
2021-06-10 21:57:07 +05:30
info:
name: WordPress REST API User Enumeration
2022-05-27 09:14:47 +05:30
author: Manas_Harsh,daffainfo,geeknik,dr0pd34d
severity: low
description: |
The REST API exposed user data for all users who had authored a post of a public post type. WordPress 4.7.1 limits this to only post types which have specified that they should be shown within the REST API.
2023-09-27 21:21:13 +05:30
impact: |
An attacker can easily determine valid usernames, which can lead to targeted attacks such as brute force attacks or social engineering.
2023-09-06 18:52:34 +05:30
remediation: |
Install a WordPress plugin such as Stop User Enumeration. Stop User Enumeration is a security plugin designed to detect and prevent hackers scanning your site for user names.
reference:
- https://www.acunetix.com/vulnerabilities/web/wordpress-rest-api-user-enumeration/
- https://wordpress.org/plugins/stop-user-enumeration/
- https://www.afteractive.com/wordpress-user-enumeration-vulnerability/
classification:
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
2022-05-27 09:14:47 +05:30
metadata:
2023-06-04 13:43:42 +05:30
verified: true
2023-09-06 18:52:34 +05:30
max-request: 2
2023-07-12 01:19:27 +05:30
vendor: wordpress
product: wordpress
shodan-query:
- http.component:"WordPress"
- http.component:"wordpress"
- cpe:"cpe:2.3:a:wordpress:wordpress"
2024-01-14 14:51:50 +05:30
tags: cve2017,cve,wordpress,wp,edb
http:
2021-06-10 21:57:07 +05:30
- method: GET
path:
- "{{BaseURL}}/wp-json/wp/v2/users/"
- "{{BaseURL}}/?rest_route=/wp/v2/users/"
2022-05-27 09:14:47 +05:30
2021-09-02 06:59:23 +07:00
stop-at-first-match: true
2023-07-12 01:19:27 +05:30
2021-06-10 21:57:07 +05:30
matchers-condition: and
matchers:
- type: word
2022-05-27 09:14:47 +05:30
part: body
2021-06-10 21:57:07 +05:30
words:
- '"id":'
- '"name":'
2025-01-31 19:14:07 +05:30
- '"slug":'
2021-07-13 18:58:52 +00:00
condition: and
2022-05-27 09:14:47 +05:30
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
extractors:
2022-03-26 16:45:50 +05:30
- type: json
2022-05-27 09:14:47 +05:30
name: "usernames"
json:
- '.[] | .slug'
2022-05-27 09:18:34 +05:30
- '.[].name'
2023-07-12 01:19:27 +05:30
part: body
2025-02-03 09:31:04 +00:00
# digest: 4b0a00483046022100cf56dabee587a0239f9c2f1b11d4b26f99ef6e5e19d7022a8892207f43cd8fc1022100e80ad268652c3d8d952f04a8834e790160ba92cfcfe8ffa2f8bc525f9fdfdd30:922c64590222798bb761d5b6d8e72950