Wordpress XML-RPC List System Methods
ID: wordpress-xmlrpc-listmethods
Severity: info
Author: 0ut0fb4nd
Tags: wordpress
Description
Section titled “Description”YAML Source
Section titled “YAML Source”id: wordpress-xmlrpc-listmethods
info: name: Wordpress XML-RPC List System Methods author: 0ut0fb4nd severity: info metadata: max-request: 1 tags: wordpress
http: - method: POST path: - "{{BaseURL}}/xmlrpc.php"
body: "<?xml version=\"1.0\" encoding=\"utf-8\"?><methodCall><methodName>system.listMethods</methodName><params></params></methodCall>"
matchers-condition: and matchers: - type: status status: - 200
- type: word words: - "system.multicall" - "system.listMethods" - "demo.sayHello" condition: and part: body# digest: 490a00463044022036b2ece2db43430cfc3b91aac204e99da888b99648fe153886085bcd5e8adc8f022013f632378778a611eaae5211d779ecee197df8fcb36534dc6c6ec5958607b7da:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wordpress-xmlrpc-listmethods.yaml"