43 lines
962 B
YAML
43 lines
962 B
YAML
id: wordpress-rdf-user-enum
|
|
|
|
info:
|
|
name: Wordpress RDF User Enumeration
|
|
author: r3dg33k
|
|
severity: info
|
|
description: Leaked Wordpress RDF leads to User Emumeration.
|
|
metadata:
|
|
max-request: 1
|
|
tags: wordpress,enum
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/feed/rdf'
|
|
|
|
host-redirects: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "application/rdf+xml"
|
|
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "<rdf:RDF"
|
|
- "<dc:creator>"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body
|
|
group: 1
|
|
regex:
|
|
- '<dc\:creator><\!\[CDATA\[(.*?)\]\]></dc'
|
|
# digest: 490a004630440220029b74ef22b0586f0c8d906ac39f346f81d8e40298879b4e17b2f31a8d679fd40220403538a23d730e4b77ab8b991908be5f81f4d2edbbd6fc8877cf7e669b20361f:922c64590222798bb761d5b6d8e72950 |