Skip to content

Conversation

@Prince-Mendiratta
Copy link
Contributor

Details

User enumeration is a way to fetch user data from your website through targeting known vulnerabilities. Although the hacker can fetch only the username details with this, it still is a serious risk. The two main vulnerable endpoint covered in this script are -

  1. {BaseURL}/wp-json/wp/v2/users
  2. {BaseURL}?author={integer}

Accessing these URLs on a vulnerable site can directly reveal all users and their usernames to an attacker. Our team at Astra Security would like to contribute the scan rule to check if a website is vulnerable to this enumeration technique or not.

The script works for both Graal.js and Nashorn Engines.

Screenshot

WordpressEnum

Sample

To simulate this vulnerability, we have one such endpoint configured at HypeJab. Can be used to test the script.

Signed-off-by: Prince Mendiratta prince.mendiratta@getastra.com

@Prince-Mendiratta
Copy link
Contributor Author

Hi team, any updates on this?

@kingthorin
Copy link
Member

All those items should be addressed now.

@Prince-Mendiratta
Copy link
Contributor Author

That's really helpful, thanks @kingthorin ! 😄

@thc202
Copy link
Member

thc202 commented Oct 7, 2021

Thank you both!

@psiinon
Copy link
Member

psiinon commented Oct 7, 2021

@kingthorin ok with this now? Its still marked as you requesting changes ;)

Signed-off-by: Prince Mendiratta <prince.mendiratta@getastra.com>
@kingthorin kingthorin merged commit 53ffac7 into zaproxy:main Oct 7, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

4 participants