diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml new file mode 100644 index 0000000000..7da41d07b4 --- /dev/null +++ b/cves/2017/CVE-2017-5487.yaml @@ -0,0 +1,30 @@ +id: CVE-2017-5487 + +info: + name: WordPress Core < 4.7.1 - Username Enumeration + author: Manas_Harsh,daffainfo + severity: medium + description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. + tags: cve,cve2017,wordpress + reference: | + - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 + - https://www.exploit-db.com/exploits/41497 + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-json/wp/v2/users/" + - "{{BaseURL}}/?rest_route=/wp/v2/users/" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - '"id":' + - '"name":' + - '"avatar_urls":' + condition: and \ No newline at end of file diff --git a/vulnerabilities/wordpress/wordpress-user-enumeration.yaml b/vulnerabilities/wordpress/wordpress-user-enumeration.yaml deleted file mode 100644 index ac734f9935..0000000000 --- a/vulnerabilities/wordpress/wordpress-user-enumeration.yaml +++ /dev/null @@ -1,21 +0,0 @@ -id: wordpress-user-enumeration - -info: - name: Wordpress user enumeration - author: Manas_Harsh,daffainfo - severity: info - tags: wordpress - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-json/wp/v2/users/" - - "{{BaseURL}}/?rest_route=/wp/v2/users/" - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: word - words: - - avatar_urls diff --git a/workflows/wordpress-workflow.yaml b/workflows/wordpress-workflow.yaml index 4153b23b39..8c7c9beef5 100644 --- a/workflows/wordpress-workflow.yaml +++ b/workflows/wordpress-workflow.yaml @@ -13,6 +13,7 @@ workflows: subtemplates: - template: cves/2016/CVE-2016-10033.yaml - template: cves/2017/CVE-2017-1000170.yaml + - template: cves/2017/CVE-2017-5487.yaml - template: cves/2018/CVE-2018-3810.yaml - template: cves/2018/CVE-2018-7422.yaml - template: cves/2019/CVE-2019-6112.yaml