Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml
2025-10-26 16:17:37 +00:00

43 lines
969 B
YAML

id: wordpress-rdf-user-enum
info:
name: Wordpress RDF User Enumeration
author: r3dg33k
severity: info
description: Leaked Wordpress RDF leads to User Emumeration.
metadata:
max-request: 1
tags: wordpress,enum,vuln
http:
- method: GET
path:
- '{{BaseURL}}/feed/rdf'
host-redirects: true
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/rdf+xml"
- type: word
part: body
words:
- "<rdf:RDF"
- "<dc:creator>"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '<dc\:creator><\!\[CDATA\[(.*?)\]\]></dc'
# digest: 4a0a004730450220320ddacf9dd31132fd43f02925032f0a06393f7749d4e1de7d98dc4cd2753ca2022100aa1af6c93dae4aa9f273d44daf313e8d66de79b5ad79e3a3f29310ac47fa6dea:922c64590222798bb761d5b6d8e72950