Files
nuclei-templates/vulnerabilities/wordpress/wp-upload-data.yaml

30 lines
686 B
YAML
Raw Normal View History

2021-07-28 23:56:51 +05:30
id: wordpress-upload-data
2021-07-30 02:36:18 +05:30
2021-07-28 23:56:51 +05:30
info:
name: wordpress-upload-data
author: pussycat0x
severity: medium
2021-10-26 12:35:56 +03:00
description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it.
2021-07-28 23:56:51 +05:30
reference: https://www.exploit-db.com/ghdb/7040
tags: wordpress,listing
2021-07-30 02:36:18 +05:30
2021-07-28 23:56:51 +05:30
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/uploads/data.txt"
2021-07-29 00:09:11 +05:30
2021-07-28 23:56:51 +05:30
matchers-condition: and
matchers:
- type: word
words:
2021-07-30 02:36:18 +05:30
- "admin:"
2021-07-29 00:09:11 +05:30
- type: word
part: header
words:
2021-07-30 02:36:18 +05:30
- "text/plain"
2021-07-29 00:09:11 +05:30
2021-07-28 23:56:51 +05:30
- type: status
status:
2021-07-29 00:09:11 +05:30
- 200