nuclei-templates/http/vulnerabilities/wordpress/wordpress-emergency-script....

32 lines
914 B
YAML
Raw Normal View History

2020-09-08 15:53:54 +00:00
id: wordpress-emergency-script
info:
name: WordPress Emergency Script
author: dwisiswant0
severity: info
2024-01-02 15:45:12 +00:00
description: Exposed wordpress password reset emergency script.
reference:
- https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: wordpress
2020-09-08 15:53:54 +00:00
http:
2020-09-08 15:53:54 +00:00
- method: GET
path:
- "{{BaseURL}}/emergency.php"
2020-09-20 12:57:43 +00:00
2020-09-08 15:53:54 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "Your use of this script is at your sole risk"
- "WordPress Administrator"
- "Update Options"
condition: and
part: body
2023-10-14 11:27:55 +00:00
2020-09-08 15:53:54 +00:00
- type: status
status:
2023-10-14 11:27:55 +00:00
- 200
# digest: 4b0a00483046022100fe1c39d8413f05d9c83b69b73902da78da3dd13a1a0338a0b798b4043e46e0cb022100fe42cab1ddc89d0fcdf495f3767f4c7e361457955219a3a4275acb551dd76e21:922c64590222798bb761d5b6d8e72950