id: wordpress-upload-data info: name: wordpress-upload-data author: pussycat0x severity: medium description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. reference: https://www.exploit-db.com/ghdb/7040 metadata: max-request: 1 tags: wordpress,listing http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/data.txt" matchers-condition: and matchers: - type: word words: - "admin:" - type: word part: header words: - "text/plain" - type: status status: - 200 # digest: 4a0a00473045022100953c101d3c2c7f0902d81aabd19b8fb0166bdeade8d249d3c9b908ad9822fe8002205b3b57212c3ec736e07b6a33d9ee2ee721811237d29747dae199b9fed63d5303:922c64590222798bb761d5b6d8e72950