nuclei-templates/http/vulnerabilities/wordpress/wp-sym404.yaml

33 lines
841 B
YAML

id: wp-sym404
info:
name: Wordpress sym404 directory
author: pussycat0x
severity: high
description: Searches for sensitive directories present in the sym404.
reference:
- https://twitter.com/momika233/status/1540325055280070656
metadata:
verified: true
max-request: 1
google-query: inurl:"/wp-includes/sym404/"
tags: wordpress,listing,wp,exposure
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/sym404/root/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4a0a0047304502205dd3cf13cb2c1cbe9e8c9ee5b5ec1cadba1c5cdc6e7da781e9b6316ebbffb061022100a57c3751a86bfebb593c932bdc096bb4fffe403802494bc0fc9bd5cf6cc9fc23:922c64590222798bb761d5b6d8e72950