• Открыта запись на вторую часть курса по анонимности и безопасности в сети интернет "Paranoid II" от команды codeby. Анонимные роутеры, Подъём, настройка и администрирование Tor-ноды, Работа с железом ПК, Удаление аппаратных закладок, Минимизация рисков, Авторские разработки и многое другое. Подробнее ...

Проблема Wordpress 3.2.1 exploit

9

999dow

Hi guys! Sorry for my eng, you may chat in russian, I will understand.
Have a problem: already know wordpress version, users and a few vulnerabilities/CVE numbers

[+] WordPress version 3.2.1 (Released on 2011-07-12) identified from sitemap generator, links opml
[!] 37 vulnerabilities identified from the version number

[!] Title: WordPress 2.5 - 3.3.1 XSS in swfupload
Reference:
Reference:
Fixed in: 3.3.2

[!] Title: WordPress 1.5.1 - 3.5 XMLRPC Pingback API Internal/External Port Scanning
Reference:
Reference:
Reference:
Fixed in: 3.5.1

[!] Title: WordPress 1.5.1 - 3.5 XMLRPC pingback additional issues
Reference:
Reference:

[!] Title: WordPress <= 3.3.2 Cross-Site Scripting (XSS) in wp-includes/default-filters.php
Reference:
Reference:
Fixed in: 3.3.3

[!] Title: WordPress <= 3.3.2 wp-admin/media-upload.php sensitive information disclosure or bypass
Reference:
Reference:
Fixed in: 3.3.3

[!] Title: WordPress <= 3.3.2 wp-admin/includes/class-wp-posts-list-table.php sensitive information disclosure by visiting a draft
Reference:
Reference:
Fixed in: 3.3.3

[!] Title: WordPress 3.0 - 3.6 Crafted String URL Redirect Restriction Bypass
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 3.6.1

[!] Title: WordPress 2.0.3 - 3.9.1 (except 3.7.4 / 3.8.4) CSRF Token Brute Forcing
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 3.9.2

[!] Title: WordPress 3.0 - 3.9.1 Authenticated Cross-Site Scripting (XSS) in Multisite
Reference:
Reference:
Reference:
Fixed in: 3.9.2

[!] Title: WordPress 3.0-3.9.2 - Unauthenticated Stored Cross-Site Scripting (XSS)
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.0

[!] Title: WordPress <= 4.0 - Long Password Denial of Service (DoS)
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.0.1

[!] Title: WordPress <= 4.0 - Server Side Request Forgery (SSRF)
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.0.1

[!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
Reference:
Reference:
Reference: Reference:
Reference:
Reference:
Fixed in: 4.2.3

[!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.5

[!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.5

[!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
Reference:
Reference:
Reference:
Fixed in: 4.5

[!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.5.3

[!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.6.1

[!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.6.1

[!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.1

[!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.1

[!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.1

[!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.1

[!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.3

[!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
Reference:
Reference:
Reference:
Reference:
Reference:

[!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.5

[!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.5

[!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.5

[!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.8.2

[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
Reference:
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.7.5

[!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.8.2

[!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.8.2

[!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
Reference:
Reference:
Reference:
Reference: Reference:
Reference:
Fixed in: 4.8.3

[!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.9.1

[!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
Reference:
Reference:
Reference:
Reference:
Fixed in: 4.9.1

[!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
Reference:
Reference:
Reference:
Reference:
Reference:

[!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:
Reference:



So... Smb know how and which of them can help to brute passwd or maybe load backdoor/shell?
 
9

999dow

Unfortunately, dont know yet how should use CVE and all of these vulns
 
9

999dow

Also hydra shows me some weird staff, like: admin/admin, but it isnt true
 
Мы в соцсетях: