nuclei-templates/http/technologies/wordpress-detect.yaml

66 lines
1.8 KiB
YAML

id: wordpress-detect
info:
name: WordPress Detect
author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser
severity: info
classification:
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
vendor: wordpress
product: wordpress
shodan-query:
- http.component:"WordPress"
- http.component:"wordpress"
- cpe:"cpe:2.3:a:wordpress:wordpress"
category: cms
tags: tech,wordpress,cms,wp
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/wp-admin/install.php"
- "{{BaseURL}}/feed/"
- "{{BaseURL}}/?feed=rss2" # alternative if /feed/ is blocked
redirects: true
max-redirects: 2
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- '<generator>https?:\/\/wordpress\.org.*</generator>'
- 'wp-login.php'
- '\/wp-content/themes\/'
- '\/wp-includes\/'
- 'name="generator" content="wordpress'
- '<link[^>]+s\d+\.wp\.com'
- '<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin
v([\d.]+) -'
- '<!--[^>]+WP-Super-Cache'
condition: or
extractors:
- type: regex
name: version_by_generator
group: 1
regex:
- '(?m)https:\/\/wordpress.org\/\?v=([0-9.]+)'
- type: regex
name: version_by_js
group: 1
regex:
- 'wp-emoji-release\.min\.js\?ver=((\d+\.?)+)\b'
- type: regex
name: version_by_css
group: 1
regex:
- 'install\.min\.css\?ver=((\d+\.?)+)\b'
# digest: 4b0a00483046022100970408d07de83a1b95c8610675c34522373d9106f3b3dbca3f28f7cbb0230d49022100f08ffae4c6bb815a394574ba8fd198fc5ea22097bd4fe2a256eb0844dc905a5f:922c64590222798bb761d5b6d8e72950