2022-09-08 13:28:46 +00:00
id : wordpress-upload-data
2022-04-22 10:38:41 +00:00
2022-09-08 13:28:46 +00:00
info :
name : wordpress-upload-data
author : pussycat0x
severity : medium
description : The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it.
reference : https://www.exploit-db.com/ghdb/7040
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : wordpress,listing
2022-04-22 10:38:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-09-08 13:28:46 +00:00
- method : GET
path :
- "{{BaseURL}}/wp-content/uploads/data.txt"
matchers-condition : and
matchers :
- type : word
words :
- "admin:"
- type : word
part : header
words :
- "text/plain"
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022100953c101d3c2c7f0902d81aabd19b8fb0166bdeade8d249d3c9b908ad9822fe8002205b3b57212c3ec736e07b6a33d9ee2ee721811237d29747dae199b9fed63d5303:922c64590222798bb761d5b6d8e72950