Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Wpdm-Cache Session

By kannthu

Medium
Vidoc logoVidoc Module
#wordpress#edb
Description

What is the "Wpdm-Cache Session?" module?

The "Wpdm-Cache Session" module is a test case designed to detect misconfigurations or vulnerabilities in the Wpdm-Cache software. It targets WordPress websites that have the Wpdm-Cache plugin installed. The severity of this module is classified as medium.

This module was authored by dhiyaneshDk.

Impact

The impact of the "Wpdm-Cache Session" module depends on the specific misconfiguration or vulnerability it detects. Without further information, it is difficult to determine the exact impact. However, it is important to address any identified issues promptly to prevent potential security risks.

How does the module work?

The "Wpdm-Cache Session" module works by sending an HTTP GET request to the "/wp-content/uploads/wpdm-cache/" path on the target WordPress website. It then applies two matching conditions to determine if a misconfiguration or vulnerability exists:

    - The module checks if the response body contains the words "Index of /", ".txt", and "wpdm-cache". This suggests that the directory listing of the wpdm-cache folder is accessible, which may indicate a misconfiguration. - The module verifies that the HTTP response status code is 200, indicating a successful request. If the status code is different, it may indicate a potential vulnerability.

If both matching conditions are met, the module will report a vulnerability.

It is important to note that this description is based on the provided JSON definition and may not cover all possible scenarios or variations of the module's behavior.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/wp-content/uploads/...
Matching conditions
word: Index of /, .txt, wpdm-cacheand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability