nuclei-templates/http/vulnerabilities/wordpress/wordpress-rdf-user-enum.yaml

44 lines
903 B
YAML
Raw Normal View History

2021-11-04 10:13:49 +00:00
id: wordpress-rdf-user-enum
2021-10-30 10:46:56 +00:00
info:
name: Wordpress RDF User Enumeration
2021-10-30 10:46:56 +00:00
author: r3dg33k
severity: info
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: wordpress,enum
2021-10-30 10:57:53 +00:00
http:
2021-10-30 10:46:56 +00:00
- method: GET
path:
- '{{BaseURL}}/feed/rdf'
2023-10-14 11:27:55 +00:00
host-redirects: true
2021-10-30 10:46:56 +00:00
matchers-condition: and
matchers:
2021-11-01 10:00:54 +00:00
- type: word
part: header
words:
- "application/rdf+xml"
- type: word
part: body
words:
- "<rdf:RDF"
- "<dc:creator>"
condition: and
2021-11-01 10:03:06 +00:00
2021-10-30 10:46:56 +00:00
- type: status
status:
- 200
2021-10-30 10:57:53 +00:00
2021-10-30 10:46:56 +00:00
extractors:
- type: regex
part: body
2021-11-01 10:00:54 +00:00
group: 1
2021-10-30 10:46:56 +00:00
regex:
2021-11-04 10:13:49 +00:00
- '<dc\:creator><\!\[CDATA\[(.*?)\]\]></dc'
# digest: 4a0a00473045022100cd017d53b2d6453a4aff5d4b5158ddb52020bb560035d1e71e598e93d8a794a7022058197c9f015871b1d82a24cf930e2c11de3804645700a5f4e746db38789600de:922c64590222798bb761d5b6d8e72950