42 lines
1.3 KiB
YAML
42 lines
1.3 KiB
YAML
id: wp-xmlrpc-pingback-detection
|
|
|
|
info:
|
|
name: Wordpress XMLRPC Pingback detection
|
|
author: pdteam
|
|
severity: info
|
|
description: WordPress XML-RPC Pingback Detection refers to the identification and monitoring of XML-RPC Pingback functionality in a WordPress website. This is vulnerable to pingback detection and bruteforce attacks.
|
|
reference:
|
|
- https://github.com/dorkerdevil/rpckiller
|
|
- https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
|
|
metadata:
|
|
max-request: 1
|
|
tags: wordpress,ssrf,oast,xmlrpc
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /xmlrpc.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
<methodCall>
|
|
<methodName>pingback.ping</methodName>
|
|
<params>
|
|
<param>
|
|
<value>
|
|
<string>http://{{interactsh-url}}</string>
|
|
</value>
|
|
</param>
|
|
<param>
|
|
<value>
|
|
<string>{{BaseURL}}/?p=1</string>
|
|
</value>
|
|
</param>
|
|
</params>
|
|
</methodCall>
|
|
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol
|
|
words:
|
|
- "http"
|
|
# digest: 490a0046304402204dfa653ba571fed5ce42b191a2069f0963385a24f8276d0c276d90ff750f52f2022049781dbe29e833c90847baf9db57c618395ea5d29e2ea161f025bffd24fd2946:922c64590222798bb761d5b6d8e72950 |