漏洞描述
WordPress Plugin Hello Dolly plugin files are publicly accessible without ABSPATH protection, exposing sensitive server path information through PHP error messages when accessed directly.
id: wp-hello-dolly-fpd
info:
name: WordPress Plugin Hello Dolly - Full Path Disclosure
author: DhiyaneshDk
severity: low
description: |
WordPress Plugin Hello Dolly plugin files are publicly accessible without ABSPATH protection, exposing sensitive server path information through PHP error messages when accessed directly.
reference:
- https://wordpress.org/plugins/hello-dolly/
metadata:
max-request: 1
verified: false
publicwww-query: "/plugins/hello-dolly/"
tags: debug,wordpress,fpd,vuln,hello-dolly,wp-plugin
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/hello-dolly/hello.php"
matchers:
- type: dsl
dsl:
- 'status_code == 200 || status_code == 500'
- 'contains(body, "hello-dolly")'
- 'contains_any(body, "Fatal error", "Uncaught Error","Call to undefined") || contains_all(body, "Warning:","failed to open stream")'
condition: and
# digest: 490a004630440220681b8d9a1ebfcfa4e0364eac94fbace8a2dd059ee89607b4061ebf852bff1af302207314386ce4d093a569b434b37c0c8cbb82b811aea9ec09ef59b13e546d8ec649:922c64590222798bb761d5b6d8e72950