nuclei-templates/http/vulnerabilities/wordpress/wordpress-emergency-script....

34 lines
916 B
YAML
Raw Normal View History

2020-09-08 15:53:54 +00:00
id: wordpress-emergency-script
info:
name: WordPress Emergency Script
author: dwisiswant0
severity: info
2024-01-02 15:45:12 +00:00
description: Exposed wordpress password reset emergency script.
reference:
- https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: wordpress
2020-09-08 15:53:54 +00:00
http:
2020-09-08 15:53:54 +00:00
- method: GET
path:
- "{{BaseURL}}/emergency.php"
2020-09-20 12:57:43 +00:00
2020-09-08 15:53:54 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "Your use of this script is at your sole risk"
- "WordPress Administrator"
- "Update Options"
condition: and
part: body
2023-10-14 11:27:55 +00:00
2020-09-08 15:53:54 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 200
# digest: 4b0a00483046022100823548ff856b338033f95061322ef1e6f3dca61c73c2c268b9d0fda60a190f5e022100b4e66e5dbb5334c8504b13fc514a3683072ac9f75b8a9374b6a5840b63fef336:922c64590222798bb761d5b6d8e72950