mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-02 08:43:27 +08:00
33 lines
792 B
YAML
33 lines
792 B
YAML
id: wordpress-user-enum
|
|
|
|
info:
|
|
name: Wordpress User Enumeration
|
|
author: r3dg33k
|
|
severity: info
|
|
description: This template detects user enumeration in wordpress.
|
|
metadata:
|
|
max-request: 1
|
|
tags: wordpress
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/?author=1"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- '(?i)Location: http(s|):\/\/[\w\.\-]+\/author\/\w+'
|
|
part: header
|
|
|
|
- type: status
|
|
status:
|
|
- 301
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: header
|
|
regex:
|
|
- 'author\/\w+'
|
|
# digest: 4a0a00473045022100890f23f0c8843c6a3851ed4e449a57a71d35500f36ad4fe2a7e8e1e7e3d10a310220094c4d72920c070aea852701dbd90465e16b51aabb08f7e932aeb7e4446dad02:922c64590222798bb761d5b6d8e72950 |