nuclei-templates/http/vulnerabilities/wordpress/wp-sym404.yaml

35 lines
963 B
YAML
Raw Normal View History

id: wp-sym404
2022-06-23 16:39:44 +00:00
info:
name: Wordpress sym404 directory
2022-06-23 16:39:44 +00:00
author: pussycat0x
severity: high
2022-06-23 16:39:44 +00:00
description: Searches for sensitive directories present in the sym404.
2022-06-24 19:32:35 +00:00
reference:
- https://twitter.com/momika233/status/1540325055280070656
2024-09-10 09:08:16 +00:00
classification:
cpe: cpe:2.3:a:wpvnteam:wp_extra:*:*:*:*:wordpress:*:*:*
2022-06-24 19:06:26 +00:00
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2024-09-10 08:22:50 +00:00
vendor: wpvnteam
2024-09-10 09:08:16 +00:00
product: wp_extra
google-query: inurl:"/wp-includes/sym404/"
tags: wordpress,listing,wp,exposure
2022-06-23 16:39:44 +00:00
http:
2022-06-23 16:39:44 +00:00
- method: GET
path:
2022-06-24 18:45:02 +00:00
- "{{BaseURL}}/wp-includes/sym404/root/etc/passwd"
2022-06-23 16:39:44 +00:00
matchers-condition: and
matchers:
2022-06-24 18:45:02 +00:00
- type: regex
part: body
regex:
- "root:.*:0:0:"
2022-06-23 16:39:44 +00:00
- type: status
status:
- 200
2024-09-12 05:14:01 +00:00
# digest: 4b0a00483046022100f2f169aaf5a1cc7dde021f497cead419b65cedc353f8546163e47286781f355c022100902bcdb31a6d8ee7ef3947c82e6e1d3fa770dbbbda0d85442bd11a95056b490c:922c64590222798bb761d5b6d8e72950