Update CVE-2018-7422.yaml
parent
e14e52c4c4
commit
c6503a105a
|
@ -4,7 +4,8 @@ info:
|
|||
name: WordPress Site Editor <=1.1.1 - Local File Inclusion
|
||||
author: LuskaBol,0x240x23elu
|
||||
severity: high
|
||||
description: WordPress Site Editor through 1.1.1 allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php.
|
||||
description: |
|
||||
WordPress Site Editor through 1.1.1 allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/44340
|
||||
- http://seclists.org/fulldisclosure/2018/Mar/40
|
||||
|
@ -26,15 +27,15 @@ requests:
|
|||
matchers-condition: or
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "DB_NAME"
|
||||
- "DB_PASSWORD"
|
||||
part: body
|
||||
condition: and
|
||||
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
part: body
|
||||
|
||||
# Enhanced by mp on 2022/06/17
|
||||
|
|
Loading…
Reference in New Issue