Files
nuclei-templates/http/vulnerabilities/wordpress/wordpress-debug-log.yaml
2023-12-08 07:52:22 +00:00

49 lines
1.1 KiB
YAML

id: wp-debug-log
info:
name: WordPress Debug Log - Exposure
author: geraldino2,dwisiswant0,philippedelteil
severity: low
metadata:
max-request: 4
tags: wp,wordpress,log,exposure
http:
- method: GET
path:
- "{{BaseURL}}/{{paths}}/debug.log"
payloads:
paths:
- 'wp-content'
- 'wordpress'
- 'wp'
- 'blog'
stop-at-first-match: true
host-redirects: true
max-redirects: 3
max-size: 5000
matchers-condition: and
matchers:
- type: word
part: header
words:
- octet-stream
- text/plain
condition: or
- type: regex
part: body
regex:
- "[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP"
- type: status
status:
- 200
extractors:
- type: dsl
dsl:
- to_string(content_length)+ " bytes"
# digest: 4b0a00483046022100a226899060a385a0cf9429ae584932a42417c1709b6d5ac8da6f0e3c89a01864022100ee67b1db931ee4fb7a8ba4210350df90510ab686125f46cd9ebb12d13c13995a:922c64590222798bb761d5b6d8e72950