diff --git a/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml index 18c995d3fa..32dd1008e6 100644 --- a/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml +++ b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml @@ -1,10 +1,11 @@ id: advanced-access-manager-lfi info: - name: WordPress Advanced Access Manager <5.9.9 - Local File Inclusion + name: WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion author: 0x_Akoko severity: high - description: WordPress Advanced Access Manager versions before 5.9.9 are vulnerable to local file inclusion and allows attackers to download the wp-config.php file and get access to the database, which is publicly reachable on many servers. + description: | + WordPress Advanced Access Manager versions before 5.9.9 are vulnerable to local file inclusion and allows attackers to download the wp-config.php file and get access to the database, which is publicly reachable on many servers. reference: - https://wpscan.com/vulnerability/9873 - https://id.wordpress.org/plugins/advanced-access-manager/ @@ -13,7 +14,7 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 - tags: wordpress,wp-plugin,lfi + tags: wordpress,wp-plugin,lfi,wp,accessmanager requests: - method: GET @@ -23,10 +24,10 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "DB_NAME" - "DB_PASSWORD" - part: body condition: and - type: status