Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname mocit.gov.sd ISP NICDC
- Continent Africa Flag
- SD
- Country Sudan Country Code SD
- Region Unknown Local time 14 Feb 2019 17:44 CAT
- City Unknown Postal Code Unknown
- IP Address 62.12.105.2 Latitude 15
- Longitude 30
- =======================================================================================================================================
- #######################################################################################################################################
- > mocit.gov.sd
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- Name: mocit.gov.sd
- Address: 62.12.105.2
- >
- #######################################################################################################################################
- HostIP:62.12.105.2
- HostName:mocit.gov.sd
- Gathered Inet-whois information for 62.12.105.2
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 62.12.96.0 - 62.12.127.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:46:54Z
- last-modified: 2019-01-07T10:46:54Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (WAGYU)
- Gathered Inic-whois information for mocit.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Error: Unable to connect - Invalid Host
- ERROR: Connection to InicWhois Server sd.whois-servers.net failed
- close error
- Gathered Netcraft information for mocit.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for mocit.gov.sd
- Netcraft.com Information gathered
- Gathered Subdomain information for mocit.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host mocit.gov.sd, Searched 0 pages containing 0 results
- Gathered E-Mail information for mocit.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host mocit.gov.sd, Searched 0 pages containing 0 results
- Gathered TCP Port information for 62.12.105.2
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 80/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 4 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://mocit.gov.sd
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: وزارة الثقافة والاعلام والسياحة
- [+] IP address: 62.12.105.2
- [+] Web Server: Could Not Detect
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 62.12.105.2
- [i] Country: Sudan
- [i] State:
- [i] City:
- [i] Latitude: 15.0
- [i] Longitude: 30.0
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 302 Found
- [i] Date: Thu, 14 Feb 2019 15:39:21 GMT
- [i] Content-Type: text/html
- [i] Content-Length: 0
- [i] X-Powered-By: PHP/5.3.29
- [i] Set-Cookie: csrf_cookie_name=338c17f74036158d14db6c42c47ff67b; expires=Thu, 14-Feb-2019 17:39:21 GMT; path=/
- [i] Location: http://mocit.gov.sd/index.php/ar/
- [i] X-Powered-By: PleskLin
- [i] Connection: close
- [i] HTTP/1.1 200 OK
- [i] Date: Thu, 14 Feb 2019 15:39:22 GMT
- [i] Content-Type: text/html
- [i] X-Powered-By: PHP/5.3.29
- [i] Set-Cookie: csrf_cookie_name=8c58df1bf97fa806ed52ed3eb34212e0; expires=Thu, 14-Feb-2019 17:39:21 GMT; path=/
- [i] Set-Cookie: user_lang=ar; expires=Thu, 14-Feb-2019 17:39:21 GMT; path=/
- [i] Set-Cookie: ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22390ad74586c1a5b39a558b8854f90b91%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A13%3A%22176.113.74.35%22%3Bs%3A10%3A%22user_agent%22%3Bb%3A0%3Bs%3A13%3A%22last_activity%22%3Bi%3A1550158761%3Bs%3A9%3A%22user_data%22%3Bs%3A0%3A%22%22%3B%7D6b7eb7793c71b387f6d616fb6f72320b; expires=Thu, 14-Feb-2019 17:39:21 GMT; path=/
- [i] X-Powered-By: PleskLin
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- mocit.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2017042400 10800 900 604800 86400
- mocit.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
- mocit.gov.sd. 21599 IN A 62.12.105.2
- mocit.gov.sd. 21599 IN MX 10 f03-web02.nic.gov.sd.
- mocit.gov.sd. 21599 IN TXT "v=spf1 mx -all"
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 62.12.105.2
- Network = 62.12.105.2 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 62.12.105.2 - 62.12.105.2 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-14 16:37 UTC
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.18s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp filtered http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 13.88 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://mocit.gov.sd/index.php/ar/
- [!] IP Address : 62.12.105.2
- [!] mocit.gov.sd doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for mocit.gov.sd
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/mocit.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp filtered http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 14.16 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns0.ndc.gov.sd. (62.12.109.2) Egypt Egypt
- ns1.ndc.gov.sd. (62.12.109.3) Egypt Egypt
- [+] MX Records
- 10 (62.12.105.2) Egypt Egypt
- [+] Host Records (A)
- mocit.gov.sd (62.12.105.2) Egypt Egypt
- [+] TXT Records
- "v=spf1 mx -all"
- [+] DNS Map: https://dnsdumpster.com/static/map/mocit.gov.sd.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] Hosts found in search engines:
- --------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 62.12.105.2:www.mocit.gov.sd
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- ######################################################################################################################################
- Enter Address Website = mocit.gov.sd
- Reverse IP With YouGetSignal 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [*] IP: 62.12.105.2
- [*] Domain: mocit.gov.sd
- [*] Total Domains: 6
- [+] agricmi.gov.sd
- [+] eastgezira.gov.sd
- [+] mocit.gov.sd
- [+] sudan.gov.sd
- [+] unionkhr.sd
- [+] www.sudan.gov.sd
- #######################################################################################################################################
- Geo IP Lookup 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] IP Address: 62.12.105.2
- [+] Country: Sudan
- [+] State:
- [+] City:
- [+] Latitude: 15.0
- [+] Longitude: 30.0
- #######################################################################################################################################
- DNS Lookup 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] mocit.gov.sd. 21599 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2017042400 10800 900 604800 86400
- [+] mocit.gov.sd. 21599 IN NS ns0.ndc.gov.sd.
- [+] mocit.gov.sd. 21599 IN NS ns1.ndc.gov.sd.
- [+] mocit.gov.sd. 21599 IN A 62.12.105.2
- [+] mocit.gov.sd. 21599 IN MX 10 f03-web02.nic.gov.sd.
- [+] mocit.gov.sd. 21599 IN TXT "v=spf1 mx -all"
- #######################################################################################################################################
- Show HTTP Header 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] HTTP/1.1 302 Moved Temporarily
- [+] Server: nginx
- [+] Date: Thu, 14 Feb 2019 15:39:14 GMT
- [+] Content-Type: text/html
- [+] Connection: keep-alive
- [+] X-Powered-By: PHP/5.3.29
- [+] Set-Cookie: csrf_cookie_name=76583c8c25944d3f10d80b9a2798d617; expires=Thu, 14-Feb-2019 17:39:14 GMT; path=/
- [+] Location: http://mocit.gov.sd/index.php/ar/
- [+] X-Powered-By: PleskLin
- #######################################################################################################################################Port Scan 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-14 16:37 UTC
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.18s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp filtered http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp filtered https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 14.38 seconds
- #######################################################################################################################################
- Traceroute 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-02-14T16:37:27+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 1.1 1.1 0.8 1.2 0.2
- 2.|-- 45.79.12.0 0.0% 3 13.4 12.5 3.7 20.6 8.5
- 3.|-- hu0-7-0-7.ccr41.dfw03.atlas.cogentco.com 0.0% 3 1.3 2.2 1.3 3.9 1.4
- 4.|-- be2764.ccr32.dfw01.atlas.cogentco.com 0.0% 3 2.1 2.0 1.9 2.1 0.1
- 5.|-- be2433.ccr22.mci01.atlas.cogentco.com 0.0% 3 12.0 11.8 11.4 12.1 0.4
- 6.|-- be2832.ccr42.ord01.atlas.cogentco.com 0.0% 3 23.4 24.2 23.4 25.0 0.8
- 7.|-- be2718.ccr22.cle04.atlas.cogentco.com 0.0% 3 30.7 30.7 30.5 30.8 0.1
- 8.|-- be2879.ccr22.alb02.atlas.cogentco.com 0.0% 3 41.3 41.3 41.3 41.4 0.1
- 9.|-- be3600.ccr32.bos01.atlas.cogentco.com 0.0% 3 45.7 45.7 45.6 45.7 0.0
- 10.|-- be2983.ccr42.lon13.atlas.cogentco.com 0.0% 3 107.5 107.7 107.5 107.9 0.2
- 11.|-- be2871.ccr21.lon01.atlas.cogentco.com 0.0% 3 108.1 108.0 107.9 108.1 0.1
- 12.|-- expressotelecom.demarc.cogentco.com 0.0% 3 108.5 107.9 107.6 108.5 0.5
- 13.|-- 185.153.20.70 0.0% 3 185.6 185.9 185.6 186.4 0.4
- 14.|-- 185.153.20.82 0.0% 3 185.6 185.8 185.6 185.9 0.1
- 15.|-- 185.153.20.94 0.0% 3 185.5 185.5 185.5 185.6 0.0
- 16.|-- 185.153.20.153 0.0% 3 230.0 219.6 214.2 230.0 9.0
- 17.|-- 212.0.131.109 0.0% 3 227.6 227.4 226.9 227.8 0.4
- 18.|-- 196.202.137.249 0.0% 3 219.0 219.3 218.9 220.0 0.6
- 19.|-- 196.202.145.94 0.0% 3 219.1 219.3 219.1 219.5 0.2
- 20.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- #######################################################################################################################################
- Ping 'mocit.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-02-14 16:37 UTC
- SENT (0.0038s) ICMP [104.237.144.6 > 62.12.105.2 Echo request (type=8/code=0) id=34398 seq=1] IP [ttl=64 id=6748 iplen=28 ]
- SENT (1.0040s) ICMP [104.237.144.6 > 62.12.105.2 Echo request (type=8/code=0) id=34398 seq=2] IP [ttl=64 id=6748 iplen=28 ]
- SENT (2.0056s) ICMP [104.237.144.6 > 62.12.105.2 Echo request (type=8/code=0) id=34398 seq=3] IP [ttl=64 id=6748 iplen=28 ]
- SENT (3.0069s) ICMP [104.237.144.6 > 62.12.105.2 Echo request (type=8/code=0) id=34398 seq=4] IP [ttl=64 id=6748 iplen=28 ]
- Max rtt: N/A | Min rtt: N/A | Avg rtt: N/A
- Raw packets sent: 4 (112B) | Rcvd: 0 (0B) | Lost: 4 (100.00%)
- Nping done: 1 IP address pinged in 4.01 seconds
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> mocit.gov.sd
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 11094
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;mocit.gov.sd. IN A
- ;; ANSWER SECTION:
- mocit.gov.sd. 82189 IN A 62.12.105.2
- ;; Query time: 35 msec
- ;; SERVER: 38.132.106.139#53(38.132.106.139)
- ;; WHEN: jeu fév 14 11:54:19 EST 2019
- ;; MSG SIZE rcvd: 57
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P1-1-Debian <<>> +trace mocit.gov.sd
- ;; global options: +cmd
- . 80866 IN NS a.root-servers.net.
- . 80866 IN NS b.root-servers.net.
- . 80866 IN NS d.root-servers.net.
- . 80866 IN NS k.root-servers.net.
- . 80866 IN NS c.root-servers.net.
- . 80866 IN NS f.root-servers.net.
- . 80866 IN NS j.root-servers.net.
- . 80866 IN NS g.root-servers.net.
- . 80866 IN NS m.root-servers.net.
- . 80866 IN NS i.root-servers.net.
- . 80866 IN NS h.root-servers.net.
- . 80866 IN NS e.root-servers.net.
- . 80866 IN NS l.root-servers.net.
- . 80866 IN RRSIG NS 8 0 518400 20190227050000 20190214040000 16749 . KjRJi44YfIrOlhPKeg7qiGlwP2QsgQmM2rTFegujHBe0cRTA1uH0NEgj FPJX+q10aSbYdSr3FGT2cW1YTRmLmAbNXGwZz84jYBm+Z+Au+Yhr9TRN 4DHs4voHtgr8u/sm5Hx72ghRbXOSK+ffIljYBTSwk4TKkFi1sqYbs7V6 tMz0LjK1rEuWHnPi2Vnrp93/WKdWMQmytU2qvKr9x6/s8TSkWWOKzaEX sOGlz9aFDRpYkreMZvOWKjUJbkzz9BgvKhnT72q0oDdhdrhle1bTM+yV rZ4pgndNM0b3TAdcMiNhNEISL0uQ0b5tUM3Y3rOT9YLlF4gA+p01UD3a cuep6w==
- ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 33 ms
- sd. 172800 IN NS sd.cctld.authdns.ripe.net.
- sd. 172800 IN NS ns1.uaenic.ae.
- sd. 172800 IN NS ns2.uaenic.ae.
- sd. 172800 IN NS ans1.sis.sd.
- sd. 172800 IN NS ans1.canar.sd.
- sd. 172800 IN NS ans2.canar.sd.
- sd. 172800 IN NS ns-sd.afrinic.net.
- sd. 86400 IN NSEC se. NS RRSIG NSEC
- sd. 86400 IN RRSIG NSEC 8 1 86400 20190227050000 20190214040000 16749 . p5xCmXr6/UJpXVFgnTVrZf/qZ0bsqHWSMXrkDI4WLDsbzoK/TSBtEgO2 KSA9Is1n0hWTqY3HfWl5R0HypWb+vtX32FbjdPNUpm2FBtpujLQgxvry /nJRvXzYKmy1NPoLesExvMg/3coxIQKAPxmfwm09ddZ5vfvc+NKc5X7D znXBTk+j6KILgL7LvhhJ0/TsikCqL3gPGKH8aW6RId4tcxJV1dmgRR8F FcGkESYs2KJmG6KN/JG5OiJ/rOVUSQCkHjUAMoX1x+qKLAy+dDJkBnyy OkdQ+04CkijYHauuo/VvJjk14/60ChpgDqc//AF+VJgvGPs9tSEQLApC wFQsOg==
- ;; Received 699 bytes from 199.7.91.13#53(d.root-servers.net) in 36 ms
- gov.sd. 14400 IN NS sd.cctld.authdns.ripe.net.
- gov.sd. 14400 IN NS ns1.uaenic.ae.
- gov.sd. 14400 IN NS ns2.uaenic.ae.
- gov.sd. 14400 IN NS ans1.sis.sd.
- gov.sd. 14400 IN NS ans1.canar.sd.
- gov.sd. 14400 IN NS ans2.canar.sd.
- gov.sd. 14400 IN NS ns-sd.afrinic.net.
- ;; Received 268 bytes from 196.216.168.26#53(ns-sd.afrinic.net) in 274 ms
- mocit.gov.sd. 14400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 14400 IN NS ns1.ndc.gov.sd.
- ;; Received 113 bytes from 2001:67c:e0::109#53(sd.cctld.authdns.ripe.net) in 106 ms
- mocit.gov.sd. 86400 IN A 62.12.105.2
- mocit.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- ;; Received 129 bytes from 62.12.109.3#53(ns1.ndc.gov.sd) in 206 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: mocit.gov.sd
- [-] DNSSEC is not configured for mocit.gov.sd
- [*] SOA ns0.ndc.gov.sd 62.12.109.2
- [*] NS ns1.ndc.gov.sd 62.12.109.3
- [*] Bind Version for 62.12.109.3 you guess!
- [*] NS ns0.ndc.gov.sd 62.12.109.2
- [*] Bind Version for 62.12.109.2 you guess!
- [*] MX f03-web02.nic.gov.sd 62.12.105.2
- [*] A mocit.gov.sd 62.12.105.2
- [*] TXT mocit.gov.sd v=spf1 mx -all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for mocit.gov.sd
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain mocit.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 62.12.109.3 - ns1.ndc.gov.sd
- [+] Zone transfer sucessful using nameserver ns1.ndc.gov.sd
- mocit.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2017042400 10800 900 604800 86400
- mocit.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- mocit.gov.sd. 86400 IN A 62.12.105.2
- mocit.gov.sd. 86400 IN MX 10 f03-web02.nic.gov.sd.
- mocit.gov.sd. 86400 IN TXT "v=spf1 mx -all"
- mail.mocit.gov.sd. 86400 IN A 62.12.105.2
- mail.mocit.gov.sd. 86400 IN MX 10 mail.mocit.gov.sd.
- webmail.mocit.gov.sd. 86400 IN CNAME mail.mocit.gov.sd.
- www.mocit.gov.sd. 86400 IN A 62.12.105.2
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 62.12.105.2 200 host mail.mocit.gov.sd nginx
- 62.12.105.2 200 alias webmail.mocit.gov.sd nginx
- 62.12.105.2 200 host mail.mocit.gov.sd nginx
- 62.12.105.2 301 host www.mocit.gov.sd nginx
- #######################################################################################################################################
- [+] Testing domain
- www.mocit.gov.sd 62.12.105.2
- [+] Dns resolving
- Domain name Ip address Name server
- mocit.gov.sd 62.12.105.2 f03-web02.nic.gov.sd
- Found 1 host(s) for mocit.gov.sd
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on mocit.gov.sd
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 106.32 seconds
- Subdomain Ip address Name server
- mail.mocit.gov.sd 62.12.105.2 f03-web02.nic.gov.sd
- webmail.mocit.gov.sd 62.12.105.2 f03-web02.nic.gov.sd
- www.mocit.gov.sd 62.12.105.2 f03-web02.nic.gov.sd
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- mocit.gov.sd -----
- Host's addresses:
- __________________
- mocit.gov.sd. 82581 IN A 62.12.105.2
- Name Servers:
- ______________
- ns0.ndc.gov.sd. 13744 IN A 62.12.109.2
- ns1.ndc.gov.sd. 13744 IN A 62.12.109.3
- Mail (MX) Servers:
- ___________________
- f03-web02.nic.gov.sd. 86400 IN A 62.12.105.2
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for mocit.gov.sd on ns0.ndc.gov.sd ...
- mocit.gov.sd. 86400 IN SOA (
- mocit.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- mocit.gov.sd. 86400 IN A 62.12.105.2
- mocit.gov.sd. 86400 IN MX 10
- mocit.gov.sd. 86400 IN TXT "v=spf1
- mail.mocit.gov.sd. 86400 IN A 62.12.105.2
- mail.mocit.gov.sd. 86400 IN MX 10
- webmail.mocit.gov.sd. 86400 IN CNAME mail.mocit.gov.sd.
- www.mocit.gov.sd. 86400 IN A 62.12.105.2
- Trying Zone Transfer for mocit.gov.sd on ns1.ndc.gov.sd ...
- mocit.gov.sd. 86400 IN SOA (
- mocit.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- mocit.gov.sd. 86400 IN A 62.12.105.2
- mocit.gov.sd. 86400 IN MX 10
- mocit.gov.sd. 86400 IN TXT "v=spf1
- mail.mocit.gov.sd. 86400 IN A 62.12.105.2
- mail.mocit.gov.sd. 86400 IN MX 10
- webmail.mocit.gov.sd. 86400 IN CNAME mail.mocit.gov.sd.
- www.mocit.gov.sd. 86400 IN A 62.12.105.2
- #######################################################################################################################################
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for mocit.gov.sd
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.mocit.gov.sd
- Virustotal: mail.mocit.gov.sd
- [-] Saving results to file: /usr/share/sniper/loot//domains/domains-mocit.gov.sd.txt
- [-] Total Unique Subdomains Found: 2
- www.mocit.gov.sd
- mail.mocit.gov.sd
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on mocit.gov.sd
- dnsdb: Unexpected return status 503
- archiveis: Get http://archive.is/*.mocit.gov.sd: dial tcp 213.183.51.24:80: connect: connection timed out
- Starting Bruteforcing of mocit.gov.sd with 9985 words
- Total 5 Unique subdomains found for mocit.gov.sd
- .mocit.gov.sd
- mail.mocit.gov.sd
- mail.mocit.gov.sd
- webmail.mocit.gov.sd
- www.mocit.gov.sd
- #######################################################################################################################################
- [*] Processing domain mocit.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 62.12.109.3 - ns1.ndc.gov.sd
- [+] Zone transfer sucessful using nameserver ns1.ndc.gov.sd
- mocit.gov.sd. 86400 IN SOA ns0.ndc.gov.sd. root.ndc.gov.sd. 2017042400 10800 900 604800 86400
- mocit.gov.sd. 86400 IN NS ns0.ndc.gov.sd.
- mocit.gov.sd. 86400 IN NS ns1.ndc.gov.sd.
- mocit.gov.sd. 86400 IN A 62.12.105.2
- mocit.gov.sd. 86400 IN MX 10 f03-web02.nic.gov.sd.
- mocit.gov.sd. 86400 IN TXT "v=spf1 mx -all"
- mail.mocit.gov.sd. 86400 IN A 62.12.105.2
- mail.mocit.gov.sd. 86400 IN MX 10 mail.mocit.gov.sd.
- webmail.mocit.gov.sd. 86400 IN CNAME mail.mocit.gov.sd.
- www.mocit.gov.sd. 86400 IN A 62.12.105.2
- #######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 mx -all
- [*] SPF record contains an All item: -all
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for mocit.gov.sd!
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:53 EST
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.16s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- Not shown: 464 filtered ports, 4 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 993/tcp open imaps
- 995/tcp open pop3s
- 8443/tcp open https-alt
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:53 EST
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.023s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:53 EST
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.21s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|general purpose|router
- Running: AVtech embedded, Linux 2.4.X|2.6.X|3.X, MikroTik RouterOS 6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:mikrotik:routeros:6.15
- OS details: AVtech Room Alert 26W environmental monitor, Tomato 1.27 - 1.28 (Linux 2.4.20), Linux 2.6.18 - 2.6.22, Linux 3.2.0, MikroTik RouterOS 6.15 (Linux 3.3.5)
- Network Distance: 20 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 23.11 ms 10.244.200.1
- 2 23.31 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 27.79 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 23.19 ms 82.102.29.44
- 5 23.61 ms 38.122.42.161
- 6 23.66 ms hu0-4-0-1.ccr21.ymq01.atlas.cogentco.com (154.54.25.126)
- 7 92.83 ms be3042.ccr21.lpl01.atlas.cogentco.com (154.54.44.161)
- 8 98.65 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 99.88 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 99.95 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
- 11 104.18 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 182.94 ms 185.153.20.70
- 13 182.95 ms 185.153.20.82
- 14 182.67 ms 185.153.20.94
- 15 196.46 ms 185.153.20.153
- 16 ... 17
- 18 212.81 ms 196.202.145.94
- 19 ...
- 20 206.78 ms f03-web02.nic.gov.sd (62.12.105.2)
- #######################################################################################################################################
- http://mocit.gov.sd [302 Found] Cookies[csrf_cookie_name], HTTPServer[nginx], IP[62.12.105.2], PHP[5.3.29,], Plesk[Lin], RedirectLocation[http://mocit.gov.sd/index.php/ar/], X-Powered-By[PHP/5.3.29, PleskLin], nginx
- http://mocit.gov.sd/index.php/ar/ [200 OK] CodeIgniter-PHP-Framework[ci_session Cookie], Cookies[ci_session,csrf_cookie_name,user_lang], Frame, HTML5, HTTPServer[nginx], IP[62.12.105.2], JQuery[1.6.4], PHP[5.3.29,], Plesk[Lin], Script[text/javascript], Title[وزارة الثقافة والاعلام والسياحة], probably WordPress, X-Powered-By[PHP/5.3.29, PleskLin], YouTube, nginx
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://mocit.gov.sd...
- _________________________________________ SITE INFO _________________________________________
- IP Title
- 62.12.105.2 وزارة الثقافة والاعلام والسياحة
- __________________________________________ VERSION __________________________________________
- Name Versions Type
- WordPress CMS
- Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
- 2.4.9
- PHP 5.3.29 Platform
- nginx Platform
- ________________________________________ INTERESTING ________________________________________
- URL Note Type
- /install.php Installation file Interesting
- /test.php Test file Interesting
- ___________________________________________ TOOLS ___________________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- _____________________________________________________________________________________________
- Time: 39.2 sec Urls: 477 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 302 Moved Temporarily
- Server: nginx
- Date: Thu, 14 Feb 2019 16:08:15 GMT
- Content-Type: text/html
- Connection: keep-alive
- X-Powered-By: PHP/5.3.29
- Set-Cookie: csrf_cookie_name=3415093e41ec9f23ba6e1233b5da84c0; expires=Thu, 14-Feb-2019 18:08:15 GMT; path=/
- Location: http://mocit.gov.sd/index.php/ar/
- X-Powered-By: PleskLin
- HTTP/1.1 302 Moved Temporarily
- Server: nginx
- Date: Thu, 14 Feb 2019 16:08:16 GMT
- Content-Type: text/html
- Connection: keep-alive
- X-Powered-By: PHP/5.3.29
- Set-Cookie: csrf_cookie_name=ac8d37ef201fc8221b6bd93244c20002; expires=Thu, 14-Feb-2019 18:08:16 GMT; path=/
- Location: http://mocit.gov.sd/index.php/ar/
- X-Powered-By: PleskLin
- HTTP/1.1 200 OK
- Server: nginx
- Date: Thu, 14 Feb 2019 16:08:16 GMT
- Content-Type: text/html
- Connection: keep-alive
- X-Powered-By: PHP/5.3.29
- Set-Cookie: csrf_cookie_name=1d32e0ea8cb6b7a7f4b9ad5c6fb1be0a; expires=Thu, 14-Feb-2019 18:08:16 GMT; path=/
- Set-Cookie: user_lang=ar; expires=Thu, 14-Feb-2019 18:08:16 GMT; path=/
- Set-Cookie: ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%2269755f6fa613543efa203f4c446a6811%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A13%3A%22176.113.74.44%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A11%3A%22curl%2F7.64.0%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1550160496%3Bs%3A9%3A%22user_data%22%3Bs%3A0%3A%22%22%3B%7D35c17dd7c3c1c6a25e6e55b37a3d2e54; expires=Thu, 14-Feb-2019 18:08:16 GMT; path=/
- X-Powered-By: PleskLin
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:06 EST
- Nmap scan report for mocit.gov.sd (62.12.105.2)
- Host is up (0.21s latency).
- rDNS record for 62.12.105.2: f03-web02.nic.gov.sd
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 185 guesses in 191 seconds, average tps: 0.8
- |_pop3-capabilities: APOP UIDL USER RESP-CODES CAPA STLS PIPELINING AUTH-RESP-CODE SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) TOP
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Timing level 5 (Insane) used
- No OS matches for host
- Network Distance: 19 hops
- Service Info: Host: fo3-web02.nic.gov.sd
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 21.62 ms 10.244.200.1
- 2 22.02 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 22.02 ms 37.120.128.168
- 4 21.79 ms 82.102.29.44
- 5 23.21 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 22.04 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 91.87 ms be3043.ccr22.lpl01.atlas.cogentco.com (154.54.44.165)
- 8 97.48 ms be2391.ccr51.lhr01.atlas.cogentco.com (154.54.39.149)
- 9 98.48 ms be3487.ccr41.lon13.atlas.cogentco.com (154.54.60.5)
- 10 98.74 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 99.84 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 178.43 ms 185.153.20.70
- 13 178.44 ms 185.153.20.82
- 14 178.43 ms 185.153.20.94
- 15 192.91 ms 185.153.20.153
- 16 ... 17
- 18 210.81 ms 196.202.145.94
- 19 209.26 ms f03-web02.nic.gov.sd (62.12.105.2)
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.12.105.2
- Testing SSL server mocit.gov.sd on port 443 using SNI name mocit.gov.sd
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: Plesk
- Issuer: Plesk
- Not valid before: Apr 20 02:40:27 2016 GMT
- Not valid after: Apr 20 02:40:27 2017 GMT
- #######################################################################################################################################
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- | phpMyAdmin | https://62.12.105.2:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:47 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.17s latency).
- Not shown: 464 filtered ports, 4 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 993/tcp open imaps
- 995/tcp open pop3s
- 8443/tcp open https-alt
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:48 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.023s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:48 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|general purpose|router
- Running: AVtech embedded, Linux 2.4.X|2.6.X|3.X, MikroTik RouterOS 6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.2.0 cpe:/o:mikrotik:routeros:6.15
- OS details: AVtech Room Alert 26W environmental monitor, Tomato 1.27 - 1.28 (Linux 2.4.20), Linux 2.6.18 - 2.6.22, Linux 3.2.0, MikroTik RouterOS 6.15 (Linux 3.3.5)
- Network Distance: 20 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 24.45 ms 10.244.200.1
- 2 24.92 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 31.95 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 24.89 ms 82.102.29.44
- 5 25.31 ms 38.122.42.161
- 6 24.94 ms hu0-4-0-1.ccr21.ymq01.atlas.cogentco.com (154.54.25.126)
- 7 95.68 ms be3042.ccr21.lpl01.atlas.cogentco.com (154.54.44.161)
- 8 100.26 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 101.34 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 101.73 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
- 11 98.62 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 177.26 ms 185.153.20.70
- 13 177.29 ms 185.153.20.82
- 14 177.02 ms 185.153.20.94
- 15 195.66 ms 185.153.20.153
- 16 ... 17
- 18 216.11 ms 196.202.145.94
- 19 ...
- 20 205.41 ms f03-web02.nic.gov.sd (62.12.105.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 11:59 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up.
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.12 ms 10.244.200.1
- 2 24.27 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 38.80 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 24.23 ms 82.102.29.44
- 5 24.32 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 24.30 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 93.66 ms 154.54.44.165
- 8 99.33 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 100.35 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 100.36 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 99.83 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 178.44 ms 185.153.20.70
- 13 178.49 ms 185.153.20.82
- 14 178.46 ms 185.153.20.94
- 15 192.23 ms 185.153.20.153
- 16 203.36 ms 212.0.131.109
- 17 205.31 ms 196.202.137.249
- 18 214.59 ms 196.202.145.94
- 19 ... 30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:01 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up.
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.35 ms 10.244.200.1
- 2 23.78 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 39.94 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 23.42 ms 82.102.29.44
- 5 25.42 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 24.22 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 93.39 ms 154.54.44.165
- 8 99.25 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 100.21 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 100.52 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 107.70 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 186.35 ms 185.153.20.70
- 13 186.64 ms 185.153.20.82
- 14 186.31 ms 185.153.20.94
- 15 200.10 ms 185.153.20.153
- 16 208.02 ms 212.0.131.109
- 17 201.44 ms 196.202.137.249
- 18 210.35 ms 196.202.145.94
- 19 ... 30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:03 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up.
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 26.41 ms 10.244.200.1
- 2 26.84 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 40.24 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 28.85 ms 82.102.29.44
- 5 26.88 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 26.89 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 97.92 ms 154.54.44.165
- 8 103.48 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 103.51 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 103.56 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 98.40 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 177.01 ms 185.153.20.70
- 13 177.02 ms 185.153.20.82
- 14 176.96 ms 185.153.20.94
- 15 190.75 ms 185.153.20.153
- 16 208.88 ms 212.0.131.109
- 17 206.14 ms 196.202.137.249
- 18 211.22 ms 196.202.145.94
- 19 ... 30
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://62.12.105.2...
- ________________________________________ SITE INFO _________________________________________
- IP Title
- 62.12.105.2 Domain Default page
- _________________________________________ VERSION __________________________________________
- Name Versions Type
- Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
- 2.4.9
- nginx Platform
- ____________________________________________________________________________________________
- Time: 1.4 sec Urls: 811 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Server: nginx
- Date: Thu, 14 Feb 2019 16:08:25 GMT
- Content-Type: text/html
- Content-Length: 3750
- Connection: keep-alive
- Last-Modified: Wed, 07 Feb 2018 11:25:44 GMT
- ETag: "ea6-5649d8e57844b"
- Accept-Ranges: bytes
- HTTP/1.1 200 OK
- Server: nginx
- Date: Thu, 14 Feb 2019 16:08:25 GMT
- Content-Type: text/html
- Content-Length: 3750
- Connection: keep-alive
- Last-Modified: Wed, 07 Feb 2018 11:25:44 GMT
- ETag: "ea6-5649d8e57844b"
- Accept-Ranges: bytes
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:06 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- |_ Statistics: Performed 218 guesses in 196 seconds, average tps: 1.2
- |_pop3-capabilities: APOP STLS RESP-CODES PIPELINING USER UIDL CAPA TOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) AUTH-RESP-CODE
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Timing level 5 (Insane) used
- No OS matches for host
- Network Distance: 19 hops
- Service Info: Host: fo3-web02.nic.gov.sd
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 22.03 ms 10.244.200.1
- 2 22.56 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 26.75 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 22.36 ms 82.102.29.44
- 5 22.58 ms 38.122.42.161
- 6 23.02 ms hu0-4-0-1.ccr21.ymq01.atlas.cogentco.com (154.54.25.126)
- 7 91.84 ms be3042.ccr21.lpl01.atlas.cogentco.com (154.54.44.161)
- 8 99.05 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 99.08 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 99.11 ms be2868.ccr21.lon01.atlas.cogentco.com (154.54.57.154)
- 11 99.99 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 178.49 ms 185.153.20.70
- 13 178.49 ms 185.153.20.82
- 14 178.46 ms 185.153.20.94
- 15 193.09 ms 185.153.20.153
- 16 ... 17
- 18 211.39 ms 196.202.145.94
- 19 206.57 ms f03-web02.nic.gov.sd (62.12.105.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:10 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up.
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 21.95 ms 10.244.200.1
- 2 22.02 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 36.50 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 22.02 ms 82.102.29.44
- 5 22.41 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 22.38 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 91.78 ms 154.54.44.165
- 8 97.73 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 98.92 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 98.62 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 99.65 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 178.50 ms 185.153.20.70
- 13 178.50 ms 185.153.20.82
- 14 178.46 ms 185.153.20.94
- 15 191.62 ms 185.153.20.153
- 16 213.56 ms 212.0.131.109
- 17 201.82 ms 196.202.137.249
- 18 210.81 ms 196.202.145.94
- 19 ... 30
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:12 EST
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.20s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 22.84 ms 10.244.200.1
- 2 23.22 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 44.46 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 23.05 ms 82.102.29.44
- 5 23.49 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 23.27 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 93.02 ms 154.54.44.165
- 8 98.72 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 100.12 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 100.17 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 99.48 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 178.15 ms 185.153.20.70
- 13 178.15 ms 185.153.20.82
- 14 177.87 ms 185.153.20.94
- 15 191.68 ms 185.153.20.153
- 16 203.26 ms 212.0.131.109
- 17 203.45 ms 196.202.137.249
- 18 212.58 ms 196.202.145.94
- 19 ... 30
- #######################################################################################################################################
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 62.12.105.2
- Testing SSL server 62.12.105.2 on port 443 using SNI name 62.12.105.2
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 256 bits CAMELLIA256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 128 bits CAMELLIA128-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 256 bits CAMELLIA256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 128 bits CAMELLIA128-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: Plesk
- Issuer: Plesk
- Not valid before: Apr 20 02:40:27 2016 GMT
- Not valid after: Apr 20 02:40:27 2017 GMT
- ######################################################################################################################################
- --------------------------------------------------------
- <<<Yasuo discovered following vulnerable applications>>>
- --------------------------------------------------------
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- | App Name | URL to Application | Potential Exploit | Username | Password |
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- | phpMyAdmin | https://62.12.105.2:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
- +------------+--------------------------------------+--------------------------------------------------+----------+----------+
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:20 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 12:20
- Completed NSE at 12:20, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 12:20
- Completed NSE at 12:20, 0.00s elapsed
- Initiating Ping Scan at 12:20
- Scanning 62.12.105.2 [4 ports]
- Completed Ping Scan at 12:20, 0.24s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 12:20
- Completed Parallel DNS resolution of 1 host. at 12:20, 0.02s elapsed
- Initiating Connect Scan at 12:20
- Scanning f03-web02.nic.gov.sd (62.12.105.2) [1000 ports]
- Discovered open port 143/tcp on 62.12.105.2
- Discovered open port 993/tcp on 62.12.105.2
- Discovered open port 995/tcp on 62.12.105.2
- Discovered open port 110/tcp on 62.12.105.2
- Discovered open port 21/tcp on 62.12.105.2
- Discovered open port 80/tcp on 62.12.105.2
- Discovered open port 443/tcp on 62.12.105.2
- Discovered open port 8443/tcp on 62.12.105.2
- Completed Connect Scan at 12:20, 14.11s elapsed (1000 total ports)
- Initiating Service scan at 12:20
- Scanning 8 services on f03-web02.nic.gov.sd (62.12.105.2)
- Completed Service scan at 12:20, 14.41s elapsed (8 services on 1 host)
- Initiating OS detection (try #1) against f03-web02.nic.gov.sd (62.12.105.2)
- Retrying OS detection (try #2) against f03-web02.nic.gov.sd (62.12.105.2)
- WARNING: OS didn't match until try #2
- Initiating Traceroute at 12:20
- Completed Traceroute at 12:20, 6.16s elapsed
- Initiating Parallel DNS resolution of 18 hosts. at 12:20
- Completed Parallel DNS resolution of 18 hosts. at 12:21, 16.51s elapsed
- NSE: Script scanning 62.12.105.2.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 12:21
- NSE Timing: About 98.90% done; ETC: 12:21 (0:00:00 remaining)
- NSE Timing: About 99.08% done; ETC: 12:22 (0:00:01 remaining)
- NSE Timing: About 99.17% done; ETC: 12:22 (0:00:01 remaining)
- NSE Timing: About 99.54% done; ETC: 12:23 (0:00:01 remaining)
- Completed NSE at 12:23, 139.17s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 12:23
- Completed NSE at 12:23, 0.45s elapsed
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up, received syn-ack ttl 44 (0.15s latency).
- Scanned at 2019-02-14 12:20:12 EST for 198s
- Not shown: 988 filtered ports
- Reason: 987 no-responses and 1 host-unreach
- PORT STATE SERVICE REASON VERSION
- 21/tcp open tcpwrapped syn-ack
- 25/tcp closed smtp conn-refused
- 80/tcp open http syn-ack nginx
- |_http-favicon: Unknown favicon MD5: 1DB747255C64A30F9236E9D929E986CA
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: nginx
- |_http-title: Domain Default page
- 110/tcp open pop3 syn-ack Dovecot pop3d
- |_pop3-capabilities: UIDL USER APOP SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) TOP AUTH-RESP-CODE STLS RESP-CODES PIPELINING CAPA
- |_ssl-date: TLS randomness does not represent time
- 113/tcp closed ident conn-refused
- 139/tcp closed netbios-ssn conn-refused
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: post-login AUTH=CRAM-MD5A0001 STARTTLS LITERAL+ IMAP4rev1 SASL-IR OK Pre-login AUTH=PLAIN listed have ID AUTH=LOGIN AUTH=DIGEST-MD5 more IDLE capabilities LOGIN-REFERRALS ENABLE
- 443/tcp open ssl/http syn-ack nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: nginx
- |_http-title: Domain Default page
- | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/[email protected]/localityName=Seattle
- | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/[email protected]/localityName=Seattle
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2016-04-20T02:40:27
- | Not valid after: 2017-04-20T02:40:27
- | MD5: a38f 7308 6ca0 a95d 2faa d3f0 6cb4 5553
- | SHA-1: 1479 6658 f803 6987 8f42 5473 9eaf 97e1 50dd 2d68
- | -----BEGIN CERTIFICATE-----
- | MIIDfTCCAmUCBFcW7BswDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNVBAYTAlVTMRMw
- | EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdTZWF0dGxlMQ0wCwYDVQQKEwRP
- | ZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFUGxlc2sxHTAbBgkqhkiG9w0B
- | CQEWDmluZm9AcGxlc2suY29tMB4XDTE2MDQyMDAyNDAyN1oXDTE3MDQyMDAyNDAy
- | N1owgYIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
- | EwdTZWF0dGxlMQ0wCwYDVQQKEwRPZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UE
- | AxMFUGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkq
- | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6ZDNfEWzRPuiKR6QpFWONPYHX+Pl6rwn
- | 6ctlVkGd2xcdnPKqzuL8z06rprVz1ro/kK7O9Xna4YfMzqoZjanxdzvjg5936PKF
- | jjf5+AA4mmbD1SD1wFCE4+U4PnE2lz/Ae/Nj5wSLK1xAL3zitACHRLTXs3a4GMQC
- | Q1LD36PSzhTl2EhDgQbSK+HB3YqsuJ8tKvn7P4qIGTZJ+HPikTXZ2e+bztPJGN4H
- | iL16zcL5F8DcIKuRx6qpmGjji8As/JsNLckYD0O8CFWZHNjbAniQ+c64Umif9UrD
- | IMcNJ3sgChQA7o8A1Qlu63FqJWGwxKlnPGt94tRpTUT1SGDCCMTTTwIDAQABMA0G
- | CSqGSIb3DQEBCwUAA4IBAQAmNWQp2HI7DaKdIhVqqviur4Z852Z1RCrqWXMl95DP
- | vtMpgRNrfdqC33xw627iWLJo4vKLvFK0OBgZ6O1gcLhcOeTGGbJLykhNjiPd0YU1
- | oIg7G6HWKeQ30q2FTv43qoc1s6uiuflihbctsF7tnLxMXQcZO3nwWkkLcuQtMDFS
- | RAkfBKbIoI/36MFs4GUh/nS78k9b3RgnSWwAD7DQi2+FrVr712EelRT627XIDp0U
- | t3D2RhpH0SqBX1ncmzF5P9wll3Yqoy0nrJOpXXEf3nP9LyTBA2imWclm4NHaBVat
- | CfsxXtJeFHpedfALThLxsTPAz/fsZoMC4s4N/ViMbF62
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- | tls-nextprotoneg:
- |_ http/1.1
- 445/tcp closed microsoft-ds conn-refused
- 993/tcp open ssl/imaps? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3s? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 8443/tcp open ssl/http syn-ack sw-cp-server httpd (Plesk Onyx 17.5.3)
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: sw-cp-server
- |_http-title: Plesk Onyx 17.5.3
- | ssl-cert: Subject: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/[email protected]/localityName=Seattle
- | Issuer: commonName=Plesk/organizationName=Odin/stateOrProvinceName=Washington/countryName=US/organizationalUnitName=Plesk/[email protected]/localityName=Seattle
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2016-04-20T02:40:27
- | Not valid after: 2017-04-20T02:40:27
- | MD5: a38f 7308 6ca0 a95d 2faa d3f0 6cb4 5553
- | SHA-1: 1479 6658 f803 6987 8f42 5473 9eaf 97e1 50dd 2d68
- | -----BEGIN CERTIFICATE-----
- | MIIDfTCCAmUCBFcW7BswDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNVBAYTAlVTMRMw
- | EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdTZWF0dGxlMQ0wCwYDVQQKEwRP
- | ZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UEAxMFUGxlc2sxHTAbBgkqhkiG9w0B
- | CQEWDmluZm9AcGxlc2suY29tMB4XDTE2MDQyMDAyNDAyN1oXDTE3MDQyMDAyNDAy
- | N1owgYIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
- | EwdTZWF0dGxlMQ0wCwYDVQQKEwRPZGluMQ4wDAYDVQQLEwVQbGVzazEOMAwGA1UE
- | AxMFUGxlc2sxHTAbBgkqhkiG9w0BCQEWDmluZm9AcGxlc2suY29tMIIBIjANBgkq
- | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6ZDNfEWzRPuiKR6QpFWONPYHX+Pl6rwn
- | 6ctlVkGd2xcdnPKqzuL8z06rprVz1ro/kK7O9Xna4YfMzqoZjanxdzvjg5936PKF
- | jjf5+AA4mmbD1SD1wFCE4+U4PnE2lz/Ae/Nj5wSLK1xAL3zitACHRLTXs3a4GMQC
- | Q1LD36PSzhTl2EhDgQbSK+HB3YqsuJ8tKvn7P4qIGTZJ+HPikTXZ2e+bztPJGN4H
- | iL16zcL5F8DcIKuRx6qpmGjji8As/JsNLckYD0O8CFWZHNjbAniQ+c64Umif9UrD
- | IMcNJ3sgChQA7o8A1Qlu63FqJWGwxKlnPGt94tRpTUT1SGDCCMTTTwIDAQABMA0G
- | CSqGSIb3DQEBCwUAA4IBAQAmNWQp2HI7DaKdIhVqqviur4Z852Z1RCrqWXMl95DP
- | vtMpgRNrfdqC33xw627iWLJo4vKLvFK0OBgZ6O1gcLhcOeTGGbJLykhNjiPd0YU1
- | oIg7G6HWKeQ30q2FTv43qoc1s6uiuflihbctsF7tnLxMXQcZO3nwWkkLcuQtMDFS
- | RAkfBKbIoI/36MFs4GUh/nS78k9b3RgnSWwAD7DQi2+FrVr712EelRT627XIDp0U
- | t3D2RhpH0SqBX1ncmzF5P9wll3Yqoy0nrJOpXXEf3nP9LyTBA2imWclm4NHaBVat
- | CfsxXtJeFHpedfALThLxsTPAz/fsZoMC4s4N/ViMbF62
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- | tls-nextprotoneg:
- |_ http/1.1
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6
- OS details: Linux 2.6.18 - 2.6.22
- TCP/IP fingerprint:
- OS:SCAN(V=7.70%E=4%D=2/14%OT=80%CT=25%CU=%PV=N%G=N%TM=5C65A412%P=x86_64-pc-
- OS:linux-gnu)SEQ(SP=105%GCD=1%ISR=10A%TI=Z%CI=Z%TS=A)SEQ(CI=Z)OPS(O1=M4B3ST
- OS:11NW7%O2=M4B3ST11NW7%O3=M4B3NNT11NW7%O4=M4B3ST11NW7%O5=M4B3ST11NW7%O6=M4
- OS:B3ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)ECN(R=Y%DF=Y%
- OS:TG=40%W=7210%O=M4B3NNSNW7%CC=Y%Q=)ECN(R=N)T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=A
- OS:S%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD
- OS:=0%Q=)T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=N)IE(R=N)
- Service Info: Host: fo3-web02.nic.gov.sd
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 26.30 ms 10.244.200.1
- 2 53.08 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 39.06 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
- 4 26.50 ms 82.102.29.44
- 5 27.12 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 26.71 ms hu0-4-0-1.ccr22.ymq01.atlas.cogentco.com (154.54.31.222)
- 7 96.33 ms 154.54.44.165
- 8 102.00 ms be2491.ccr52.lhr01.atlas.cogentco.com (154.54.39.118)
- 9 103.36 ms be3488.ccr42.lon13.atlas.cogentco.com (154.54.60.13)
- 10 103.44 ms be2871.ccr21.lon01.atlas.cogentco.com (154.54.58.186)
- 11 99.27 ms expressotelecom.demarc.cogentco.com (149.14.248.202)
- 12 177.88 ms 185.153.20.70
- 13 179.65 ms 185.153.20.82
- 14 177.90 ms 185.153.20.94
- 15 203.23 ms 185.153.20.153
- 16 206.77 ms 212.0.131.109
- 17 200.98 ms 196.202.137.249
- 18 212.37 ms 196.202.145.94
- 19 ... 30
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 12:23
- Completed NSE at 12:23, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 12:23
- Completed NSE at 12:23, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 199.27 seconds
- Raw packets sent: 142 (10.432KB) | Rcvd: 50 (3.905KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-14 12:23 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 12:23
- Completed NSE at 12:23, 0.00s elapsed
- Initiating NSE at 12:23
- Completed NSE at 12:23, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 12:23
- Completed Parallel DNS resolution of 1 host. at 12:23, 0.02s elapsed
- Initiating UDP Scan at 12:23
- Scanning f03-web02.nic.gov.sd (62.12.105.2) [14 ports]
- Completed UDP Scan at 12:23, 1.24s elapsed (14 total ports)
- Initiating Service scan at 12:23
- Scanning 12 services on f03-web02.nic.gov.sd (62.12.105.2)
- Service scan Timing: About 8.33% done; ETC: 12:43 (0:17:58 remaining)
- Completed Service scan at 12:25, 102.59s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against f03-web02.nic.gov.sd (62.12.105.2)
- Retrying OS detection (try #2) against f03-web02.nic.gov.sd (62.12.105.2)
- Initiating Traceroute at 12:25
- Completed Traceroute at 12:25, 7.07s elapsed
- Initiating Parallel DNS resolution of 1 host. at 12:25
- Completed Parallel DNS resolution of 1 host. at 12:25, 0.03s elapsed
- NSE: Script scanning 62.12.105.2.
- Initiating NSE at 12:25
- Completed NSE at 12:25, 20.31s elapsed
- Initiating NSE at 12:25
- Completed NSE at 12:25, 1.03s elapsed
- Nmap scan report for f03-web02.nic.gov.sd (62.12.105.2)
- Host is up (0.023s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 22.69 ms 10.244.200.1
- 2 ... 3
- 4 23.28 ms 10.244.200.1
- 5 26.82 ms 10.244.200.1
- 6 26.81 ms 10.244.200.1
- 7 26.80 ms 10.244.200.1
- 8 26.79 ms 10.244.200.1
- 9 26.78 ms 10.244.200.1
- 10 26.79 ms 10.244.200.1
- 11 ... 18
- 19 22.20 ms 10.244.200.1
- 20 22.83 ms 10.244.200.1
- 21 21.92 ms 10.244.200.1
- 22 ... 29
- 30 21.18 ms 10.244.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 12:25
- Completed NSE at 12:25, 0.00s elapsed
- Initiating NSE at 12:25
- Completed NSE at 12:25, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 135.43 seconds
- Raw packets sent: 147 (13.614KB) | Rcvd: 29 (3.062KB)
- #######################################################################################################################################
- [+] URL: http://mocit.gov.sd/
- [+] Effective URL: http://mocit.gov.sd/index.php/ar/
- [+] Started: Thu Feb 14 11:04:56 2019
- Interesting Finding(s):
- [+] http://mocit.gov.sd/index.php/ar/
- | Interesting Entry: X-Powered-By: PHP/5.3.29, PleskLin
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- Fingerprinting the version - Time: 00:00:31 <=========> (350 / 350) 100.00% Time: 00:00:31
- [+] WordPress version 3.9.1 identified (Insecure, released on 2014-05-08).
- | Detected By: Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/lofslidera560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/scrollbara560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/stylea560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/weather-font/weathera560.css?ver=3.9.1
- |
- | [!] 66 vulnerabilities identified:
- |
- | [!] Title: WordPress 3.9 & 3.9.1 Unlikely Code Execution
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7527
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5203
- | - https://core.trac.wordpress.org/changeset/29389
- |
- | [!] Title: WordPress 2.0.3 - 3.9.1 (except 3.7.4 / 3.8.4) CSRF Token Brute Forcing
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7528
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
- | - https://core.trac.wordpress.org/changeset/29384
- | - https://core.trac.wordpress.org/changeset/29408
- |
- | [!] Title: WordPress 3.0 - 3.9.1 Authenticated Cross-Site Scripting (XSS) in Multisite
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7529
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
- | - https://core.trac.wordpress.org/changeset/29398
- |
- | [!] Title: WordPress 3.6 - 3.9.1 XXE in GetID3 Library
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7530
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
- | - https://github.com/JamesHeinrich/getID3/commit/dc8549079a24bb0619b6124ef2df767704f8d0bc
- | - http://getid3.sourceforge.net/
- | - http://wordpress.org/news/2014/08/wordpress-3-9-2/
- | - http://lab.onsec.ru/2014/09/wordpress-392-xxe-through-media-upload.html
- | - https://github.com/ONsec-Lab/scripts/blob/master/getid3-xxe.wav
- |
- | [!] Title: WordPress 3.4.2 - 3.9.2 Does Not Invalidate Sessions Upon Logout
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7531
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5868
- | - http://whiteoaksecurity.com/blog/2012/12/17/cve-2012-5868-wordpress-342-sessions-not-terminated-upon-explicit-user-logout
- | - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/leveraging-lfi-to-get-full-compromise-on-wordpress-sites/
- |
- | [!] Title: WordPress 3.0-3.9.2 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7680
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
- | - http://klikki.fi/adv/wordpress.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - http://klikki.fi/adv/wordpress_update.html
- |
- | [!] Title: WordPress <= 4.0 - Long Password Denial of Service (DoS)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7681
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
- | - https://www.exploit-db.com/exploits/35413/
- | - https://www.exploit-db.com/exploits/35414/
- | - http://www.behindthefirewalls.com/2014/11/wordpress-denial-of-service-responsible-disclosure.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_long_password_dos
- |
- | [!] Title: WordPress <= 4.0 - Server Side Request Forgery (SSRF)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7696
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
- | - http://www.securityfocus.com/bid/71234/
- | - https://core.trac.wordpress.org/changeset/30444
- |
- | [!] Title: WordPress 3.9, 3.9.1, 3.9.2, 4.0 - XSS in Media Playlists
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7697
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032
- | - https://core.trac.wordpress.org/changeset/30422
- |
- | [!] Title: WordPress <= 4.1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.1.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7929
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
- | - https://wordpress.org/news/2015/04/wordpress-4-1-2/
- | - https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/
- |
- | [!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 3.9.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8111
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
- | - https://wordpress.org/news/2015/07/wordpress-4-2-3/
- | - https://twitter.com/klikkioy/status/624264122570526720
- | - https://klikki.fi/adv/wordpress3.html
- |
- | [!] Title: WordPress <= 4.2.3 - wp_untrash_post_comments SQL Injection
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8126
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
- | - https://github.com/WordPress/WordPress/commit/70128fe7605cb963a46815cf91b0a5934f70eff5
- |
- | [!] Title: WordPress <= 4.2.3 - Timing Side Channel Attack
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8130
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
- | - https://core.trac.wordpress.org/changeset/33536
- |
- | [!] Title: WordPress <= 4.2.3 - Widgets Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8131
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
- | - https://core.trac.wordpress.org/changeset/33529
- |
- | [!] Title: WordPress <= 4.2.3 - Nav Menu Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8132
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
- | - https://core.trac.wordpress.org/changeset/33541
- |
- | [!] Title: WordPress <= 4.2.3 - Legacy Theme Preview Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8133
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
- | - https://core.trac.wordpress.org/changeset/33549
- | - https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
- |
- | [!] Title: WordPress <= 4.3 - Authenticated Shortcode Tags Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8186
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress <= 4.3 - User List Table Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8187
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
- |
- | [!] Title: WordPress <= 4.3 - Publish Post & Mark as Sticky Permission Issue
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8188
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress 3.7-4.4 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8358
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
- | - https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/7ab65139c6838910426567849c7abed723932b87
- |
- | [!] Title: WordPress 3.7-4.4.1 - Local URIs Server Side Request Forgery (SSRF)
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8376
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36435
- | - https://hackerone.com/reports/110801
- |
- | [!] Title: WordPress 3.7-4.4.1 - Open Redirect
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8377
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36444
- |
- | [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8473
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- |
- | [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8474
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- |
- | [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8475
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- | - https://codex.wordpress.org/Version_4.5
- |
- | [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- | Fixed in: 3.9.12
- | References:
- | - https://wpvulndb.com/vulnerabilities/8489
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- | - https://wordpress.org/news/2016/05/wordpress-4-5-2/
- | - https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- | - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- |
- | [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8519
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- | - https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- |
- | [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8520
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- |
- | [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8615
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- | - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- | - http://seclists.org/fulldisclosure/2016/Sep/6
- |
- | [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8616
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- |
- | [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8716
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- | - https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8718
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- | - https://www.mehmetince.net/low-severity-wordpress/
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- |
- | [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8719
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- | - https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8720
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- | - https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8721
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- | - https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- | Fixed in: 3.9.16
- | References:
- | - https://wpvulndb.com/vulnerabilities/8730
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- |
- | [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8765
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- | - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- | - http://seclists.org/oss-sec/2017/q1/563
- |
- | [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8766
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- |
- | [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- | References:
- | - https://wpvulndb.com/vulnerabilities/8807
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- | - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- | - http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- | - https://core.trac.wordpress.org/ticket/25239
- |
- | [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8815
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- | - https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8816
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8817
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8818
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- | - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- |
- | [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8819
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- | - https://hackerone.com/reports/203515
- | - https://hackerone.com/reports/203515
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8820
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- |
- | [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8905
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- |
- | [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- | Fixed in: 4.7.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8906
- | - https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://wpvulndb.com/vulnerabilities/8905
- |
- | [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8910
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41398
- |
- | [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8911
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41457
- |
- | [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- | Fixed in: 3.9.21
- | References:
- | - https://wpvulndb.com/vulnerabilities/8941
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- | - https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- | - https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- | - https://twitter.com/ircmaxell/status/923662170092638208
- | - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- |
- | [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8966
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- |
- | [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8967
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- |
- | [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8969
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- |
- | [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- | Fixed in: 3.9.23
- | References:
- | - https://wpvulndb.com/vulnerabilities/9006
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- | - https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- | - https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/ticket/42720
- |
- | [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- | References:
- | - https://wpvulndb.com/vulnerabilities/9021
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- | - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- | - https://github.com/quitten/doser.py
- | - https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- |
- | [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9053
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- |
- | [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9054
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- |
- | [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9055
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- |
- | [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- | Fixed in: 3.9.25
- | References:
- | - https://wpvulndb.com/vulnerabilities/9100
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- | - https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- | - http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- | - https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- | - https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- | - https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated File Delete
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9169
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Post Type Bypass
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9170
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
- |
- | [!] Title: WordPress <= 5.0 - PHP Object Injection via Meta Data
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9171
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9172
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9173
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
- |
- | [!] Title: WordPress <= 5.0 - User Activation Screen Search Engine Indexing
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9174
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9175
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
- [+] WordPress theme in use: asssd
- | Location: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/
- | Style URL: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/style.css
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:05 <============> (10 / 10) 100.00% Time: 00:00:05
- [i] No Users Found.
- [+] Finished: Thu Feb 14 11:05:54 2019
- [+] Requests Done: 408
- [+] Cached Requests: 9
- [+] Data Sent: 259.038 KB
- [+] Data Received: 1.077 MB
- [+] Memory used: 15.758 MB
- [+] Elapsed time: 00:00:57
- #######################################################################################################################################
- [+] URL: http://mocit.gov.sd/
- [+] Effective URL: http://mocit.gov.sd/index.php/ar/
- [+] Started: Thu Feb 14 10:50:16 2019
- Interesting Finding(s):
- [+] http://mocit.gov.sd/index.php/ar/
- | Interesting Entry: X-Powered-By: PHP/5.3.29, PleskLin
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- Fingerprinting the version - Time: 00:00:30 <=========> (350 / 350) 100.00% Time: 00:00:30
- [+] WordPress version 3.9.1 identified (Insecure, released on 2014-05-08).
- | Detected By: Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/lofslidera560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/scrollbara560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/stylea560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/weather-font/weathera560.css?ver=3.9.1
- |
- | [!] 66 vulnerabilities identified:
- |
- | [!] Title: WordPress 3.9 & 3.9.1 Unlikely Code Execution
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7527
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5203
- | - https://core.trac.wordpress.org/changeset/29389
- |
- | [!] Title: WordPress 2.0.3 - 3.9.1 (except 3.7.4 / 3.8.4) CSRF Token Brute Forcing
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7528
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
- | - https://core.trac.wordpress.org/changeset/29384
- | - https://core.trac.wordpress.org/changeset/29408
- |
- | [!] Title: WordPress 3.0 - 3.9.1 Authenticated Cross-Site Scripting (XSS) in Multisite
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7529
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
- | - https://core.trac.wordpress.org/changeset/29398
- |
- | [!] Title: WordPress 3.6 - 3.9.1 XXE in GetID3 Library
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7530
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
- | - https://github.com/JamesHeinrich/getID3/commit/dc8549079a24bb0619b6124ef2df767704f8d0bc
- | - http://getid3.sourceforge.net/
- | - http://wordpress.org/news/2014/08/wordpress-3-9-2/
- | - http://lab.onsec.ru/2014/09/wordpress-392-xxe-through-media-upload.html
- | - https://github.com/ONsec-Lab/scripts/blob/master/getid3-xxe.wav
- |
- | [!] Title: WordPress 3.4.2 - 3.9.2 Does Not Invalidate Sessions Upon Logout
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7531
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5868
- | - http://whiteoaksecurity.com/blog/2012/12/17/cve-2012-5868-wordpress-342-sessions-not-terminated-upon-explicit-user-logout
- | - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/leveraging-lfi-to-get-full-compromise-on-wordpress-sites/
- |
- | [!] Title: WordPress 3.0-3.9.2 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7680
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
- | - http://klikki.fi/adv/wordpress.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - http://klikki.fi/adv/wordpress_update.html
- |
- | [!] Title: WordPress <= 4.0 - Long Password Denial of Service (DoS)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7681
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
- | - https://www.exploit-db.com/exploits/35413/
- | - https://www.exploit-db.com/exploits/35414/
- | - http://www.behindthefirewalls.com/2014/11/wordpress-denial-of-service-responsible-disclosure.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_long_password_dos
- |
- | [!] Title: WordPress <= 4.0 - Server Side Request Forgery (SSRF)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7696
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
- | - http://www.securityfocus.com/bid/71234/
- | - https://core.trac.wordpress.org/changeset/30444
- |
- | [!] Title: WordPress 3.9, 3.9.1, 3.9.2, 4.0 - XSS in Media Playlists
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7697
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032
- | - https://core.trac.wordpress.org/changeset/30422
- |
- | [!] Title: WordPress <= 4.1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.1.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7929
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
- | - https://wordpress.org/news/2015/04/wordpress-4-1-2/
- | - https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/
- |
- | [!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 3.9.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8111
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
- | - https://wordpress.org/news/2015/07/wordpress-4-2-3/
- | - https://twitter.com/klikkioy/status/624264122570526720
- | - https://klikki.fi/adv/wordpress3.html
- |
- | [!] Title: WordPress <= 4.2.3 - wp_untrash_post_comments SQL Injection
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8126
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
- | - https://github.com/WordPress/WordPress/commit/70128fe7605cb963a46815cf91b0a5934f70eff5
- |
- | [!] Title: WordPress <= 4.2.3 - Timing Side Channel Attack
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8130
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
- | - https://core.trac.wordpress.org/changeset/33536
- |
- | [!] Title: WordPress <= 4.2.3 - Widgets Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8131
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
- | - https://core.trac.wordpress.org/changeset/33529
- |
- | [!] Title: WordPress <= 4.2.3 - Nav Menu Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8132
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
- | - https://core.trac.wordpress.org/changeset/33541
- |
- | [!] Title: WordPress <= 4.2.3 - Legacy Theme Preview Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8133
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
- | - https://core.trac.wordpress.org/changeset/33549
- | - https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
- |
- | [!] Title: WordPress <= 4.3 - Authenticated Shortcode Tags Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8186
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress <= 4.3 - User List Table Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8187
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
- |
- | [!] Title: WordPress <= 4.3 - Publish Post & Mark as Sticky Permission Issue
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8188
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress 3.7-4.4 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8358
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
- | - https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/7ab65139c6838910426567849c7abed723932b87
- |
- | [!] Title: WordPress 3.7-4.4.1 - Local URIs Server Side Request Forgery (SSRF)
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8376
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36435
- | - https://hackerone.com/reports/110801
- |
- | [!] Title: WordPress 3.7-4.4.1 - Open Redirect
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8377
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36444
- |
- | [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8473
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- |
- | [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8474
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- |
- | [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8475
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- | - https://codex.wordpress.org/Version_4.5
- |
- | [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- | Fixed in: 3.9.12
- | References:
- | - https://wpvulndb.com/vulnerabilities/8489
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- | - https://wordpress.org/news/2016/05/wordpress-4-5-2/
- | - https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- | - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- |
- | [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8519
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- | - https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- |
- | [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8520
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- |
- | [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8615
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- | - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- | - http://seclists.org/fulldisclosure/2016/Sep/6
- |
- | [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8616
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- |
- | [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8716
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- | - https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8718
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- | - https://www.mehmetince.net/low-severity-wordpress/
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- |
- | [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8719
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- | - https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8720
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- | - https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8721
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- | - https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- | Fixed in: 3.9.16
- | References:
- | - https://wpvulndb.com/vulnerabilities/8730
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- |
- | [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8765
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- | - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- | - http://seclists.org/oss-sec/2017/q1/563
- |
- | [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8766
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- |
- | [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- | References:
- | - https://wpvulndb.com/vulnerabilities/8807
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- | - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- | - http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- | - https://core.trac.wordpress.org/ticket/25239
- |
- | [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8815
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- | - https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8816
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8817
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8818
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- | - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- |
- | [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8819
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- | - https://hackerone.com/reports/203515
- | - https://hackerone.com/reports/203515
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8820
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- |
- | [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8905
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- |
- | [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- | Fixed in: 4.7.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8906
- | - https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://wpvulndb.com/vulnerabilities/8905
- |
- | [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8910
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41398
- |
- | [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8911
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41457
- |
- | [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- | Fixed in: 3.9.21
- | References:
- | - https://wpvulndb.com/vulnerabilities/8941
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- | - https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- | - https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- | - https://twitter.com/ircmaxell/status/923662170092638208
- | - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- |
- | [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8966
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- |
- | [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8967
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- |
- | [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8969
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- |
- | [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- | Fixed in: 3.9.23
- | References:
- | - https://wpvulndb.com/vulnerabilities/9006
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- | - https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- | - https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/ticket/42720
- |
- | [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- | References:
- | - https://wpvulndb.com/vulnerabilities/9021
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- | - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- | - https://github.com/quitten/doser.py
- | - https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- |
- | [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9053
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- |
- | [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9054
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- |
- | [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9055
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- |
- | [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- | Fixed in: 3.9.25
- | References:
- | - https://wpvulndb.com/vulnerabilities/9100
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- | - https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- | - http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- | - https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- | - https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- | - https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated File Delete
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9169
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Post Type Bypass
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9170
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
- |
- | [!] Title: WordPress <= 5.0 - PHP Object Injection via Meta Data
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9171
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9172
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9173
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
- |
- | [!] Title: WordPress <= 5.0 - User Activation Screen Search Engine Indexing
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9174
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9175
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
- [+] WordPress theme in use: asssd
- | Location: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/
- | Style URL: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/style.css
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating All Plugins (via Passive Methods)
- [i] No plugins Found.
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:00:02 <=============> (21 / 21) 100.00% Time: 00:00:02
- [i] No Config Backups Found.
- [+] Finished: Thu Feb 14 10:51:10 2019
- [+] Requests Done: 416
- [+] Cached Requests: 5
- [+] Data Sent: 257.474 KB
- [+] Data Received: 596.052 KB
- [+] Memory used: 77.254 MB
- [+] Elapsed time: 00:00:53
- #######################################################################################################################################
- [+] URL: http://mocit.gov.sd/
- [+] Effective URL: http://mocit.gov.sd/index.php/ar/
- [+] Started: Thu Feb 14 10:52:48 2019
- Interesting Finding(s):
- [+] http://mocit.gov.sd/index.php/ar/
- | Interesting Entry: X-Powered-By: PHP/5.3.29, PleskLin
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- Fingerprinting the version - Time: 00:00:00 <> (350 / 350) 100.00% Time: 00:00:00
- [+] WordPress version 3.9.1 identified (Insecure, released on 2014-05-08).
- | Detected By: Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/lofslidera560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/scrollbara560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/stylea560.css?ver=3.9.1
- | - http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/css/weather-font/weathera560.css?ver=3.9.1
- |
- | [!] 66 vulnerabilities identified:
- |
- | [!] Title: WordPress 3.9 & 3.9.1 Unlikely Code Execution
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7527
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5203
- | - https://core.trac.wordpress.org/changeset/29389
- |
- | [!] Title: WordPress 2.0.3 - 3.9.1 (except 3.7.4 / 3.8.4) CSRF Token Brute Forcing
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7528
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5204
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5205
- | - https://core.trac.wordpress.org/changeset/29384
- | - https://core.trac.wordpress.org/changeset/29408
- |
- | [!] Title: WordPress 3.0 - 3.9.1 Authenticated Cross-Site Scripting (XSS) in Multisite
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7529
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5240
- | - https://core.trac.wordpress.org/changeset/29398
- |
- | [!] Title: WordPress 3.6 - 3.9.1 XXE in GetID3 Library
- | Fixed in: 3.9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7530
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2053
- | - https://github.com/JamesHeinrich/getID3/commit/dc8549079a24bb0619b6124ef2df767704f8d0bc
- | - http://getid3.sourceforge.net/
- | - http://wordpress.org/news/2014/08/wordpress-3-9-2/
- | - http://lab.onsec.ru/2014/09/wordpress-392-xxe-through-media-upload.html
- | - https://github.com/ONsec-Lab/scripts/blob/master/getid3-xxe.wav
- |
- | [!] Title: WordPress 3.4.2 - 3.9.2 Does Not Invalidate Sessions Upon Logout
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7531
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5868
- | - http://whiteoaksecurity.com/blog/2012/12/17/cve-2012-5868-wordpress-342-sessions-not-terminated-upon-explicit-user-logout
- | - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/leveraging-lfi-to-get-full-compromise-on-wordpress-sites/
- |
- | [!] Title: WordPress 3.0-3.9.2 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.0
- | References:
- | - https://wpvulndb.com/vulnerabilities/7680
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9031
- | - http://klikki.fi/adv/wordpress.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - http://klikki.fi/adv/wordpress_update.html
- |
- | [!] Title: WordPress <= 4.0 - Long Password Denial of Service (DoS)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7681
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
- | - https://www.exploit-db.com/exploits/35413/
- | - https://www.exploit-db.com/exploits/35414/
- | - http://www.behindthefirewalls.com/2014/11/wordpress-denial-of-service-responsible-disclosure.html
- | - https://wordpress.org/news/2014/11/wordpress-4-0-1/
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_long_password_dos
- |
- | [!] Title: WordPress <= 4.0 - Server Side Request Forgery (SSRF)
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7696
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9038
- | - http://www.securityfocus.com/bid/71234/
- | - https://core.trac.wordpress.org/changeset/30444
- |
- | [!] Title: WordPress 3.9, 3.9.1, 3.9.2, 4.0 - XSS in Media Playlists
- | Fixed in: 4.0.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7697
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9032
- | - https://core.trac.wordpress.org/changeset/30422
- |
- | [!] Title: WordPress <= 4.1.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 4.1.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/7929
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3438
- | - https://wordpress.org/news/2015/04/wordpress-4-1-2/
- | - https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/
- |
- | [!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 3.9.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8111
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
- | - https://wordpress.org/news/2015/07/wordpress-4-2-3/
- | - https://twitter.com/klikkioy/status/624264122570526720
- | - https://klikki.fi/adv/wordpress3.html
- |
- | [!] Title: WordPress <= 4.2.3 - wp_untrash_post_comments SQL Injection
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8126
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
- | - https://github.com/WordPress/WordPress/commit/70128fe7605cb963a46815cf91b0a5934f70eff5
- |
- | [!] Title: WordPress <= 4.2.3 - Timing Side Channel Attack
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8130
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
- | - https://core.trac.wordpress.org/changeset/33536
- |
- | [!] Title: WordPress <= 4.2.3 - Widgets Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8131
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
- | - https://core.trac.wordpress.org/changeset/33529
- |
- | [!] Title: WordPress <= 4.2.3 - Nav Menu Title Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8132
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
- | - https://core.trac.wordpress.org/changeset/33541
- |
- | [!] Title: WordPress <= 4.2.3 - Legacy Theme Preview Cross-Site Scripting (XSS)
- | Fixed in: 3.9.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8133
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
- | - https://core.trac.wordpress.org/changeset/33549
- | - https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
- |
- | [!] Title: WordPress <= 4.3 - Authenticated Shortcode Tags Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8186
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress <= 4.3 - User List Table Cross-Site Scripting (XSS)
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8187
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
- |
- | [!] Title: WordPress <= 4.3 - Publish Post & Mark as Sticky Permission Issue
- | Fixed in: 3.9.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/8188
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
- | - https://wordpress.org/news/2015/09/wordpress-4-3-1/
- | - http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
- | - http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
- |
- | [!] Title: WordPress 3.7-4.4 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8358
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
- | - https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/7ab65139c6838910426567849c7abed723932b87
- |
- | [!] Title: WordPress 3.7-4.4.1 - Local URIs Server Side Request Forgery (SSRF)
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8376
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36435
- | - https://hackerone.com/reports/110801
- |
- | [!] Title: WordPress 3.7-4.4.1 - Open Redirect
- | Fixed in: 3.9.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8377
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
- | - https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/36444
- |
- | [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8473
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- |
- | [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8474
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- |
- | [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8475
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- | - https://codex.wordpress.org/Version_4.5
- |
- | [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- | Fixed in: 3.9.12
- | References:
- | - https://wpvulndb.com/vulnerabilities/8489
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- | - https://wordpress.org/news/2016/05/wordpress-4-5-2/
- | - https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- | - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- |
- | [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8519
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- | - https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- |
- | [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- | Fixed in: 3.9.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8520
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- |
- | [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8615
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- | - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- | - http://seclists.org/fulldisclosure/2016/Sep/6
- |
- | [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- | Fixed in: 3.9.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/8616
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- |
- | [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8716
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- | - https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8718
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- | - https://www.mehmetince.net/low-severity-wordpress/
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- |
- | [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8719
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- | - https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8720
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- | - https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- | Fixed in: 3.9.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/8721
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- | - https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- | Fixed in: 3.9.16
- | References:
- | - https://wpvulndb.com/vulnerabilities/8730
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- |
- | [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8765
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- | - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- | - http://seclists.org/oss-sec/2017/q1/563
- |
- | [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- | Fixed in: 3.9.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/8766
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- |
- | [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- | References:
- | - https://wpvulndb.com/vulnerabilities/8807
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- | - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- | - http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- | - https://core.trac.wordpress.org/ticket/25239
- |
- | [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8815
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- | - https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8816
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8817
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8818
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- | - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- |
- | [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8819
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- | - https://hackerone.com/reports/203515
- | - https://hackerone.com/reports/203515
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- | Fixed in: 3.9.19
- | References:
- | - https://wpvulndb.com/vulnerabilities/8820
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- |
- | [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8905
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- |
- | [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- | Fixed in: 4.7.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8906
- | - https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://wpvulndb.com/vulnerabilities/8905
- |
- | [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8910
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41398
- |
- | [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- | Fixed in: 3.9.20
- | References:
- | - https://wpvulndb.com/vulnerabilities/8911
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41457
- |
- | [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- | Fixed in: 3.9.21
- | References:
- | - https://wpvulndb.com/vulnerabilities/8941
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- | - https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- | - https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- | - https://twitter.com/ircmaxell/status/923662170092638208
- | - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- |
- | [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8966
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- |
- | [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8967
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- |
- | [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- | Fixed in: 3.9.22
- | References:
- | - https://wpvulndb.com/vulnerabilities/8969
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- |
- | [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- | Fixed in: 3.9.23
- | References:
- | - https://wpvulndb.com/vulnerabilities/9006
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- | - https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- | - https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/ticket/42720
- |
- | [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- | References:
- | - https://wpvulndb.com/vulnerabilities/9021
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- | - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- | - https://github.com/quitten/doser.py
- | - https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- |
- | [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9053
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- |
- | [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9054
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- |
- | [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- | Fixed in: 3.9.24
- | References:
- | - https://wpvulndb.com/vulnerabilities/9055
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- |
- | [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- | Fixed in: 3.9.25
- | References:
- | - https://wpvulndb.com/vulnerabilities/9100
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- | - https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- | - http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- | - https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- | - https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- | - https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated File Delete
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9169
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Post Type Bypass
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9170
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
- |
- | [!] Title: WordPress <= 5.0 - PHP Object Injection via Meta Data
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9171
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9172
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9173
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
- |
- | [!] Title: WordPress <= 5.0 - User Activation Screen Search Engine Indexing
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9174
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
- | Fixed in: 3.9.26
- | References:
- | - https://wpvulndb.com/vulnerabilities/9175
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
- [+] WordPress theme in use: asssd
- | Location: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/
- | Style URL: http://mocit.gov.sd/resources/files/ar/wp-content/themes/asssd/style.css
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:04 <==> (10 / 10) 100.00% Time: 00:00:04
- [i] No Users Found.
- [+] Finished: Thu Feb 14 10:52:56 2019
- [+] Requests Done: 14
- [+] Cached Requests: 403
- [+] Data Sent: 13.673 KB
- [+] Data Received: 533.083 KB
- [+] Memory used: 11.672 MB
- [+] Elapsed time: 00:00:07
- #######################################################################################################################################
- [-] Date & Time: 14/02/2019 10:50:18
- [I] Threads: 5
- [-] Target: http://mocit.gov.sd/index.php/ar (62.12.105.2)
- [M] Website Not in HTTPS: http://mocit.gov.sd/index.php/ar
- [I] X-Powered-By: PHP/5.3.29
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [I] X-Content-Type-Options: Not Enforced
- [L] No Robots.txt Found
- [I] CMS Detection: WordPress
- [I] Wordpress Theme: asssd
- [M] XML-RPC services are enabled
- [I] Autocomplete Off Not Found: http://mocit.gov.sd/index.php/ar/wp-login.php
- [-] Default WordPress Files:
- [-] Searching Wordpress Plugins ...
- [I] adrotate
- [M] EDB-ID: 17888 "WordPress Plugin AdRotate 3.6.5 - SQL Injection"
- [M] EDB-ID: 18114 "WordPress Plugin AdRotate 3.6.6 - SQL Injection"
- [M] EDB-ID: 31834 "WordPress Plugin AdRotate 3.9.4 - 'clicktracker.ph?track' SQL Injection"
- [I] ads-box
- [M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
- [I] firestats
- [M] EDB-ID: 14308 "WordPress Plugin Firestats - Remote Configuration File Download"
- [M] EDB-ID: 33367 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (1)"
- [M] EDB-ID: 33368 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (2)"
- [I] simple-ads-manager
- [M] EDB-ID: 36613 "WordPress Plugin Simple Ads Manager - Multiple SQL Injections"
- [M] EDB-ID: 36614 "WordPress Plugin Simple Ads Manager 2.5.94 - Arbitrary File Upload"
- [M] EDB-ID: 36615 "WordPress Plugin Simple Ads Manager - Information Disclosure"
- [M] EDB-ID: 39133 "WordPress Plugin Simple Ads Manager 2.9.4.116 - SQL Injection"
- [I] wp-bannerize
- [M] EDB-ID: 17764 "WordPress Plugin Bannerize 2.8.6 - SQL Injection"
- [M] EDB-ID: 17906 "WordPress Plugin Bannerize 2.8.7 - SQL Injection"
- [M] EDB-ID: 36193 "WordPress Plugin WP Bannerize 2.8.7 - 'ajax_sorter.php' SQL Injection"
- [I] Checking for Directory Listing Enabled ...
- [-] Date & Time: 14/02/2019 10:54:48
- [-] Completed in: 0:04:30
- #######################################################################################################################################
- Anonymous JTSEC #OpSudan Full Recon #12
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement