nuclei-templates/http/vulnerabilities/wordpress/wp-full-path-disclosure.yaml

25 lines
918 B
YAML

id: wp-full-path-disclosure
info:
name: Wordpress - Path Disclosure
author: arcc
severity: info
description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.
reference:
- https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/#why-are-there-path-disclosures-when-directly-loading-certain-files
- https://core.trac.wordpress.org/ticket/38317
metadata:
max-request: 1
tags: debug,wordpress,fpd
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/rss-functions.php"
matchers:
- type: word
words:
- 'Call to undefined function _deprecated_file()'
part: body
# digest: 4b0a00483046022100a372ec9fea62f315625c86ab4fe8e868caebf91ceca3ba04ca5dc4b3af17756c022100ba462bdc67318d1f0e99d17a892a4170351dab73705a17b2f9358809931031c1:922c64590222798bb761d5b6d8e72950