nuclei-templates/http/technologies/wordpress-detect.yaml

63 lines
1.5 KiB
YAML
Raw Normal View History

id: wordpress-detect
info:
2022-10-25 06:09:19 +00:00
name: WordPress Detect
author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser
severity: info
metadata:
max-request: 4
2022-10-20 14:33:49 +00:00
verified: true
shodan-query: http.component:"WordPress"
vendor: wordpress
product: wordpress
category: cms
2022-10-25 06:09:19 +00:00
tags: tech,wordpress,cms,wp
http:
- method: GET
path:
2022-11-15 03:23:46 +00:00
- "{{BaseURL}}"
2022-11-16 15:35:00 +00:00
- "{{BaseURL}}/wp-admin/install.php"
2022-11-15 11:30:51 +00:00
- "{{BaseURL}}/feed/"
2022-11-15 03:23:46 +00:00
- "{{BaseURL}}/?feed=rss2" # alternative if /feed/ is blocked
2023-03-04 19:43:25 +00:00
redirects: true
max-redirects: 2
2022-11-16 15:35:00 +00:00
stop-at-first-match: true
2022-11-15 03:23:46 +00:00
matchers-condition: and
matchers:
- type: regex
regex:
2022-11-15 03:23:46 +00:00
- '<generator>https?:\/\/wordpress\.org.*</generator>'
2022-11-15 11:31:46 +00:00
- 'wp-login.php'
2022-11-15 03:23:46 +00:00
- '\/wp-content/themes\/'
- '\/wp-includes\/'
- 'name="generator" content="wordpress'
2022-10-24 13:18:01 +00:00
- '<link[^>]+s\d+\.wp\.com'
- '<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -'
2022-11-15 11:31:46 +00:00
- '<!--[^>]+WP-Super-Cache'
2022-10-24 13:18:01 +00:00
condition: or
2022-11-15 11:30:51 +00:00
2022-11-15 03:23:46 +00:00
- type: status
status:
- 200
extractors:
- type: regex
2022-11-15 03:23:46 +00:00
name: version_by_generator
group: 1
regex:
2022-10-20 14:33:49 +00:00
- '(?m)https:\/\/wordpress.org\/\?v=([0-9.]+)'
2022-11-15 03:23:46 +00:00
- type: regex
name: version_by_js
group: 1
regex:
- 'wp-emoji-release\.min\.js\?ver=((\d+\.?)+)\b'
- type: regex
name: version_by_css
group: 1
regex:
- 'install\.min\.css\?ver=((\d+\.?)+)\b'