Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "wordpress-upload-data" module is a test case designed to detect misconfigurations or vulnerabilities in remote WordPress installations. It focuses on identifying the presence of a file named 'data.txt' within the '/wp-content/uploads/' folder, which may contain sensitive information. The severity of this module is classified as medium.
Author: pussycat0x
If the "wordpress-upload-data" module detects the presence of the 'data.txt' file, it indicates a potential security risk. The file may contain sensitive information that could be accessed by unauthorized individuals, potentially leading to data breaches or other malicious activities.
The "wordpress-upload-data" module utilizes HTTP request templates and matching conditions to identify the presence of the 'data.txt' file. It sends a GET request to the '/wp-content/uploads/data.txt' path and applies the following matching conditions:
- The response body must contain the word "admin:" - The response headers must include the word "text/plain" - The response status code must be 200 (OK)If all of these conditions are met, the module considers the 'data.txt' file to be present and potentially containing sensitive information.
Example HTTP request:
GET /wp-content/uploads/data.txt
Matching conditions:
- Response body contains the word "admin:" - Response headers include the word "text/plain" - Response status code is 200 (OK)For more information, refer to the exploit-db reference.
Metadata: max-request: 1