Template rename / update

patch-1
sandeep 2021-06-10 21:57:07 +05:30
parent f89cc07a5c
commit 69ded42e3a
3 changed files with 31 additions and 21 deletions

View File

@ -0,0 +1,30 @@
id: CVE-2017-5487
info:
name: WordPress Core < 4.7.1 - Username Enumeration
author: Manas_Harsh,daffainfo
severity: medium
description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
tags: cve,cve2017,wordpress
reference: |
- https://nvd.nist.gov/vuln/detail/CVE-2017-5487
- https://www.exploit-db.com/exploits/41497
requests:
- method: GET
path:
- "{{BaseURL}}/wp-json/wp/v2/users/"
- "{{BaseURL}}/?rest_route=/wp/v2/users/"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- '"id":'
- '"name":'
- '"avatar_urls":'
condition: and

View File

@ -1,21 +0,0 @@
id: wordpress-user-enumeration
info:
name: Wordpress user enumeration
author: Manas_Harsh,daffainfo
severity: info
tags: wordpress
requests:
- method: GET
path:
- "{{BaseURL}}/wp-json/wp/v2/users/"
- "{{BaseURL}}/?rest_route=/wp/v2/users/"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- avatar_urls

View File

@ -13,6 +13,7 @@ workflows:
subtemplates:
- template: cves/2016/CVE-2016-10033.yaml
- template: cves/2017/CVE-2017-1000170.yaml
- template: cves/2017/CVE-2017-5487.yaml
- template: cves/2018/CVE-2018-3810.yaml
- template: cves/2018/CVE-2018-7422.yaml
- template: cves/2019/CVE-2019-6112.yaml