Files
nuclei-templates/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml
2024-12-01 13:57:55 +00:00

25 lines
918 B
YAML

id: wp-full-path-disclosure
info:
name: Wordpress - Path Disclosure
author: arcc
severity: info
description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.
reference:
- https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-certain-files
- https://core.trac.wordpress.org/ticket/38317
metadata:
max-request: 1
tags: debug,wordpress,fpd
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/rss-functions.php"
matchers:
- type: word
words:
- 'Call to undefined function _deprecated_file()'
part: body
# digest: 4b0a00483046022100c37746adf02741b253629d0c366359bdeac6de7fa8b5bd56a2f8c972b3772849022100b7b5bd4b990aff9a5a733ca9b641adab53ba87ae866316ac86fc76edb1890ad3:922c64590222798bb761d5b6d8e72950