id: wordpress-upload-data info: name: wordpress-upload-data author: pussycat0x severity: medium description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. reference: https://www.exploit-db.com/ghdb/7040 metadata: max-request: 1 tags: wordpress,listing http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/data.txt" matchers-condition: and matchers: - type: word words: - "admin:" - type: word part: header words: - "text/plain" - type: status status: - 200 # digest: 4a0a00473045022079adc01aecf82dbee2f9533069c9bf55c60736b63b530c3be80da0a62ed0c8c2022100ec141b6a940f1a7e5065aebf77e5aa928a924bd243e5f1aa48670b0c01d0517b:922c64590222798bb761d5b6d8e72950