Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-user-enum.yaml
2024-12-01 13:57:55 +00:00

33 lines
792 B
YAML

id: wordpress-user-enum
info:
name: Wordpress User Enumeration
author: r3dg33k
severity: info
description: This template detects user enumeration in wordpress.
metadata:
max-request: 1
tags: wordpress
http:
- method: GET
path:
- "{{BaseURL}}/?author=1"
matchers-condition: and
matchers:
- type: regex
regex:
- '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+'
part: header
- type: status
status:
- 301
extractors:
- type: regex
part: header
regex:
- 'author\/\w+'
# digest: 4a0a00473045022100890f23f0c8843c6a3851ed4e449a57a71d35500f36ad4fe2a7e8e1e7e3d10a310220094c4d72920c070aea852701dbd90465e16b51aabb08f7e932aeb7e4446dad02:922c64590222798bb761d5b6d8e72950