nuclei-templates/http/vulnerabilities/wordpress/wp-sym404.yaml

30 lines
627 B
YAML

id: wp-sym404
info:
name: Wordpress sym404 directory
author: pussycat0x
severity: high
description: Searches for sensitive directories present in the sym404.
reference:
- https://twitter.com/momika233/status/1540325055280070656
metadata:
verified: true
google-query: inurl:"/wp-includes/sym404/"
tags: wordpress,listing,wp,exposure
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/sym404/root/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200