From b4eb7e05dcd610f2188fb91b0d95dfacd43cd9f8 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 2 Aug 2021 20:04:36 +0530 Subject: [PATCH] Added wordpress-gotmls-detect --- technologies/wordpress-gotmls-detect.yaml | 30 +++++++++++++++++++++++ 1 file changed, 30 insertions(+) create mode 100644 technologies/wordpress-gotmls-detect.yaml diff --git a/technologies/wordpress-gotmls-detect.yaml b/technologies/wordpress-gotmls-detect.yaml new file mode 100644 index 0000000000..210a1489d6 --- /dev/null +++ b/technologies/wordpress-gotmls-detect.yaml @@ -0,0 +1,30 @@ +id: wordpress-gotmls-detect + +info: + name: Detect WordPress Plugin Anti-Malware Security and Bruteforce Firewall + author: vsh00t + reference: https://www.exploit-db.com/exploits/50107 + severity: info + tags: wordpress,wp-plugin,gotmls + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action={{randstr}}&file=../../../../../../../../../Windows/win.ini" + + matchers-condition: and + matchers: + - type: word + words: + - "gotmls" + part: header + + - type: status + status: + - 302 + + extractors: + - type: kval + part: header + kval: + - Location