Advertisement
dr-iman

Wordpress Detector

Jul 15th, 2017
597
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 17.55 KB | None | 0 0
  1. #!/usr/bin/perl
  2. # Wordpress Detector
  3. # Coded By : DR-IMAN ( Telegram : @DarkCod3r )
  4. # List Of Wordpress Vulnerabilities
  5.  
  6. use Term::ANSIColor;
  7.  
  8. use LWP::UserAgent;
  9.  
  10. use HTTP::Request::Common qw(GET);
  11.  
  12. use WWW::Mechanize;  
  13.  
  14. use Socket;
  15.  
  16. $mech = WWW::Mechanize->new(autocheck => 0);
  17. $ag = LWP::UserAgent->new();
  18.  
  19. $ag->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  20.  
  21. $ag->timeout(10);
  22.  
  23. sub getSites {
  24.     for($count=10;$count<=1000;$count+=10)
  25.     {
  26.         $k++;
  27. #       $url = "http://www.hotbot.com/search/web?pn=$k&q=ip%3A$ip&keyvol=01f9093871a6d24c0d94";
  28.         $url = "https://www.bing.com/search?q=ip%3a$ip&go=Submit+Query&qs=ds&first=$count&FORM=PERE$k";
  29. #       $url = "https://www.bing.com/search?q=ip%3A$ip+&count=50&first=$count";
  30.         $resp = $ag->request(HTTP::Request->new(GET => $url));
  31.  
  32.         $rrs = $resp->content;
  33.  
  34.  
  35.  
  36.         while($rrs =~ m/<a href=\"?http:\/\/(.*?)\//g)
  37.         {
  38.    
  39.             $link = $1;
  40.        
  41.             if ( $link !~ /overture|msn|live|bing|yahoo|duckduckgo|google|yahoo|microsof/)
  42.             {
  43.                 if ($link !~ /^http:/)
  44.                 {
  45.                     $link = 'http://' . "$link" . '/';
  46.                 }
  47.    
  48.                 if($link !~ /\"|\?|\=|index\.php/)
  49.                 {
  50.                     if  (!  grep (/$link/,@result))
  51.                     {
  52.                         push(@result,$link);
  53.                     }
  54.                 }
  55.             }
  56.         }
  57.     }
  58.     $found = $#result + 1;
  59.     print "found $found sites\n";
  60.    
  61. }
  62.  
  63.  
  64. sub WPS {
  65.     foreach $site (@result)
  66.     {
  67.         $url = $mech->get("$site");
  68.         $Scont = $mech->content;
  69.         if ($Scont =~ m/<meta name="generator" content="WordPress 4.7.2/ig)
  70.         {
  71.             $license = $site."license.txt";
  72.             $horse = $mech->get("$license");
  73.             if ($horse->is_success)
  74.             {
  75.                 $Scont = $mech->content;
  76.                 $login = $site."wp-login.php";
  77.                 $logUrl = $mech->get("$login");
  78.                         if ($Scont =~ m/ver=4.7.2/)    
  79.                 {
  80.                     push @WPS,$site;
  81.                     print "$site\n";
  82.                 }
  83.                 elsif($logUrl->is_success)
  84.                 {
  85.                     push @WPS,$site;
  86.                     print "$site\n";
  87.                 }
  88.  
  89.             }
  90.  
  91.         }
  92.  
  93.  
  94.     }
  95.  
  96. }
  97.  
  98.  
  99. sub WPS1 {
  100.     foreach $site (@result)
  101.     {
  102.         if  (!  grep (/$site/,@WPS))
  103.         {
  104.             $url = $mech->get("$site");
  105.             $Scont = $mech->content;
  106.             if ($Scont =~ m/<meta name="generator" content="WordPress 4.7.1/ig)
  107.             {
  108.                 push @JM,$site;
  109.                 print "$site\n";
  110.             }
  111.             else
  112.             {
  113.                 $admin = "$site/wp-login.php";
  114.                 $mech->get("$site");
  115.                 $AdminCont = $mech->content;
  116.                 if ($AdminCont =~ m/ver=4.7.1/ig)
  117.                 {
  118.                     push @JM,$site;
  119.                     print "$site\n";
  120.                 }
  121.             }
  122.         }
  123.     }
  124. }
  125.  
  126.  
  127. sub WPS2 {
  128.     foreach $site (@result)
  129.     {
  130.         if  (!  grep (/$site/,@WPS))
  131.         {
  132.             $url = $mech->get("$site");
  133.             $Scont = $mech->content;
  134.             if ($Scont =~ m/<meta name="generator" content="WordPress 4.7/ig)
  135.             {
  136.                 push @JM,$site;
  137.                 print "$site\n";
  138.             }
  139.             else
  140.             {
  141.                 $admin = "$site/wp-login.php";
  142.                 $mech->get("$site");
  143.                 $AdminCont = $mech->content;
  144.                 if ($AdminCont =~ m/ver=4.7/ig)
  145.                 {
  146.                     push @JM,$site;
  147.                     print "$site\n";
  148.                 }
  149.             }
  150.         }
  151.     }
  152. }
  153.  
  154.  
  155. sub WPS3 {
  156.     foreach $site (@result)
  157.     {
  158.         if  (!  grep (/$site/,@WPS))
  159.         {
  160.             $url = $mech->get("$site");
  161.             $Scont = $mech->content;
  162.             if ($Scont =~ m/<meta name="generator" content="WordPress 3.6/ig)
  163.             {
  164.                 push @JM,$site;
  165.                 print "$site\n";
  166.             }
  167.             else
  168.             {
  169.                 $admin = "$site/wp-login.php";
  170.                 $mech->get("$site");
  171.                 $AdminCont = $mech->content;
  172.                 if ($AdminCont =~ m/ver=3.6/ig)
  173.                 {
  174.                     push @JM,$site;
  175.                     print "$site\n";
  176.                 }
  177.             }
  178.         }
  179.     }
  180. }
  181.  
  182.  
  183. sub WPS4 {
  184.     foreach $site (@result)
  185.     {
  186.         if  (!  grep (/$site/,@WPS))
  187.         {
  188.             $url = $mech->get("$site");
  189.             $Scont = $mech->content;
  190.             if ($Scont =~ m/<meta name="generator" content="WordPress 4.7.4/ig)
  191.             {
  192.                 push @JM,$site;
  193.                 print "$site\n";
  194.             }
  195.             else
  196.             {
  197.                 $admin = "$site/wp-login.php";
  198.                 $mech->get("$site");
  199.                 $AdminCont = $mech->content;
  200.                 if ($AdminCont =~ m/ver=4.7.4/ig)
  201.                 {
  202.                     push @JM,$site;
  203.                     print "$site\n";
  204.                 }
  205.             }
  206.         }
  207.     }
  208. }
  209.  
  210.  
  211. sub WPS5 {
  212.     foreach $site (@result)
  213.     {
  214.         if  (!  grep (/$site/,@WPS))
  215.         {
  216.             $url = $mech->get("$site");
  217.             $Scont = $mech->content;
  218.             if ($Scont =~ m/<meta name="generator" content="WordPress 3.6.9/ig)
  219.             {
  220.                 push @JM,$site;
  221.                 print "$site\n";
  222.             }
  223.             else
  224.             {
  225.                 $admin = "$site/wp-login.php";
  226.                 $mech->get("$site");
  227.                 $AdminCont = $mech->content;
  228.                 if ($AdminCont =~ m/ver=3.6.9/ig)
  229.                 {
  230.                     push @JM,$site;
  231.                     print "$site\n";
  232.                 }
  233.             }
  234.         }
  235.     }
  236. }
  237.  
  238.  
  239. sub WPS6 {
  240.     foreach $site (@result)
  241.     {
  242.         if  (!  grep (/$site/,@WPS))
  243.         {
  244.             $url = $mech->get("$site");
  245.             $Scont = $mech->content;
  246.             if ($Scont =~ m/<meta name="generator" content="WordPress 3.4/ig)
  247.             {
  248.                 push @JM,$site;
  249.                 print "$site\n";
  250.             }
  251.             else
  252.             {
  253.                 $admin = "$site/wp-login.php";
  254.                 $mech->get("$site");
  255.                 $AdminCont = $mech->content;
  256.                 if ($AdminCont =~ m/ver=3.4/ig)
  257.                 {
  258.                     push @JM,$site;
  259.                     print "$site\n";
  260.                 }
  261.             }
  262.         }
  263.     }
  264. }
  265.  
  266. sub vuln {
  267.  
  268. print" Wordpress Version $input \n";
  269.  
  270. }
  271.  
  272.  
  273. sub IP_id {
  274.     print "Enter The Ip of Server or Site Link\n";
  275.     print ">> ";
  276.     $input =<stdin>;
  277.     chomp($input);
  278.     if ($input =~ m/\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}/)
  279.     {
  280.         $ip = $input;
  281.         print "Pleast wait ... Getting WebSites...\n";
  282.         getSites();
  283.     }
  284.     elsif ($input =~ m/\D/g)
  285.     {
  286.         if ($input =~ m/https:\/\//)
  287.         {
  288.             $source = substr($input,8,length($input));
  289.             print "Site : $source\n";
  290.             print "Getting IP Adress...\n";
  291.                         $ip = inet_ntoa(inet_aton($source));
  292.                         print "IP: $ip\n";
  293.             print "Pleast wait ... Getting WebSites...\n";
  294.             getSites();
  295.         }
  296.                 elsif ($input =~ m/http:\/\//)
  297.                 {
  298.                         $source = substr($input,7,length($input));
  299.                         print "Site : $source\n";
  300.             print "Getting IP Adress...\n";
  301.                         $ip = inet_ntoa(inet_aton($source));
  302.                         print "IP: $ip\n";
  303.             print "Pleast wait ... Getting WebSites ...\n";
  304.             getSites();
  305.  
  306.                 }
  307.         else
  308.         {
  309.             print "Site : $input\n";
  310.             print "Getting IP Adress...\n";
  311.             $ip = inet_ntoa(inet_aton($input));
  312.             print "IP : $ip\n";
  313.             print "Pleast wait ... Getting WebSites...\n";
  314.             getSites();
  315.         }
  316.     }  
  317. }
  318. system(($^O eq 'MSWin32') ? 'cls' : 'clear');
  319. sub Into {
  320. print"\n";
  321. print colored ("                           >> Coded By DR-IMAN << ",'bold yellow'),"\n";
  322.     print qq(                        
  323.                                           ,,                                            
  324. `7MMF'     A     `7MF'                  `7MM                                            
  325.  `MA     ,MA     ,V                      MM                                            
  326.   VM:   ,VVM:   ,V ,pW"Wq.`7Mb,od8  ,M""bMM `7MMpdMAo.`7Mb,od8 .gP"Ya  ,pP"Ybd ,pP"Ybd
  327.    MM.  M' MM.  M'6W'   `Wb MM' "',AP    MM   MM   `Wb  MM' "',M'   Yb 8I   `" 8I   `"
  328.    `MM A'  `MM A' 8M     M8 MM    8MI    MM   MM    M8  MM    8M"""""" `YMMMa. `YMMMa.
  329.     :MM;    :MM;  YA.   ,A9 MM    `Mb    MM   MM   ,AP  MM    YM.    , L.   I8 L.   I8
  330.       VF      VF    `Ybmd9'.JMML.   `Wbmd"MML. MMbmmd' .JMML.   `Mbmmd' M9mmmP' M9mmmP'
  331.                                               MM                                      
  332.                                             .JMML.                                    
  333.                                                                                        
  334.                                                                                        
  335. `7MM"""Yb.             mm                     mm                                        
  336.   MM    `Yb.           MM                     MM                                        
  337.  MM     `Mb  .gP"Ya mmMMmm .gP"Ya   ,p6"bo mmMMmm ,pW"Wq.`7Mb,od8                      
  338.  MM      MM ,M'   Yb  MM  ,M'   Yb 6M'  OO   MM  6W'   `Wb MM' "'                      
  339.   MM     ,MP 8M""""""  MM  8M"""""" 8M        MM  8M     M8 MM                          
  340.   MM    ,dP' YM.    ,  MM  YM.    , YM.    ,  MM  YA.   ,A9 MM                          
  341. .JMMmmmdP'    `Mbmmd'  `Mbmo`Mbmmd'  YMbmd'   `Mbmo`Ybmd9'.JMML.    
  342.                                                                                      
  343. );     
  344. #Just Type Name.For Example : WPS or WPS1
  345.    print "
  346.     Choice Method: 1-WPS(4.7.2) , 2-WPS1(4.7.1) , 3-WPS2(4.7) , 4-WPS3(3.6),";
  347.     print "\n
  348.     5-WPS4(4.7.4) , 6-WPS5(3.6.9) , 7-WPS6(3.4) , 8-List of Wordpress Vulnerabilities(vuln)  :";
  349.     $choice1 = <stdin>;                    
  350.     chomp ($choice1);
  351.     if ($choice1 eq "WPS" or $choice1 eq "wps" or $choice1 eq "" or $choice1 eq "Wps" or $choice1 eq "1")
  352.     {
  353.         print "\nExtract Wordpress  4.7.2  sites...\n";
  354.         print "==============================\n";
  355.         IP_id();
  356.         print "Searching for Wordpress sites\n";
  357.         WPS();
  358.         $n_found = $#WPS;
  359.         print "\t>> Found $n_found Wordpress sites\n\n";
  360.         print "Do you want to save the result (Y\\n): ";
  361.         $save = <stdin>;
  362.         chomp($save);
  363.         if ($save eq "Y" or $save eq "" or $save eq "y")
  364.         {
  365.             open(wp, ">WPS.txt");
  366.             map {$_ = "$_\n"} (@WPS);
  367.             print wp @WPS;
  368.         print "\t>> Saved at WPS.txt\n";
  369.         }
  370.     }
  371.    
  372.     elsif ($choice1 eq "WPS1" or $choice1 eq "wps1" or $choice1 eq "" or $choice1 eq "Wps1" or $choice1 eq "2")
  373.     {
  374.         print "\nExtract Wordpress  4.7.1  sites...\n";
  375.         print "==============================\n";
  376.         IP_id();
  377.         print "Searching for Wordpress sites\n";
  378.         WPS();
  379.         $n_found = $#WPS1;
  380.         print "\t>> Found $n_found Wordpress(4.7.1) sites\n\n";
  381.         print "Do you want to save the result (Y\\n): ";
  382.         $save = <stdin>;
  383.         chomp($save);
  384.         if ($save eq "Y" or $save eq "" or $save eq "y")
  385.         {
  386.             open(wp, ">WPS1.txt");
  387.             map {$_ = "$_\n"} (@WPS1);
  388.             print wp @WPS1;
  389.         print "\t>> Saved at WPS1.txt\n";
  390.         }
  391.     }
  392.    
  393.         elsif ($choice1 eq "WPS2" or $choice1 eq "wps2" or $choice1 eq "" or $choice1 eq "Wps2" or $choice1 eq "3")
  394.     {
  395.         print "\nExtract Wordpress  4.7  sites...\n";
  396.         print "==============================\n";
  397.         IP_id();
  398.         print "Searching for Wordpress(4.7) sites\n";
  399.         WPS();
  400.         $n_found = $#WPS2;
  401.         print "\t>> Found $n_found Wordpress sites\n\n";
  402.         print "Do you want to save the result (Y\\n): ";
  403.         $save = <stdin>;
  404.         chomp($save);
  405.         if ($save eq "Y" or $save eq "" or $save eq "y")
  406.         {
  407.             open(wp, ">WPS2.txt");
  408.             map {$_ = "$_\n"} (@WPS2);
  409.             print wp @WPS2;
  410.         print "\t>> Saved at WPS2.txt\n";
  411.         }
  412.     }
  413.  
  414.         elsif ($choice1 eq "WPS3" or $choice1 eq "wps3" or $choice1 eq "" or $choice1 eq "Wps3" or $choice1 eq "4" )
  415.     {
  416.         print "\nExtract Wordpress  3.6  sites...\n";
  417.         print "==============================\n";
  418.         IP_id();
  419.         print "Searching for Wordpress(3.6) sites\n";
  420.         WPS();
  421.         $n_found = $#WPS3;
  422.         print "\t>> Found $n_found Wordpress sites\n\n";
  423.         print "Do you want to save the result (Y\\n): ";
  424.         $save = <stdin>;
  425.         chomp($save);
  426.         if ($save eq "Y" or $save eq "" or $save eq "y")
  427.         {
  428.             open(wp, ">WPS3.txt");
  429.             map {$_ = "$_\n"} (@WPS3);
  430.             print wp @WPS3;
  431.         print "\t>> Saved at WPS3.txt\n";
  432.         }
  433.     }
  434.    
  435.         elsif ($choice1 eq "WPS4" or $choice1 eq "wps4" or $choice1 eq "" or $choice1 eq "Wps4" or $choice1 eq "5" )
  436.     {
  437.         print "\nExtract Wordpress  4.7.4  sites...\n";
  438.         print "==============================\n";
  439.         IP_id();
  440.         print "Searching for Wordpress(4.7.4) sites\n";
  441.         WPS();
  442.         $n_found = $#WPS4;
  443.         print "\t>> Found $n_found Wordpress sites\n\n";
  444.         print "Do you want to save the result (Y\\n): ";
  445.         $save = <stdin>;
  446.         chomp($save);
  447.         if ($save eq "Y" or $save eq "" or $save eq "y")
  448.         {
  449.             open(wp, ">WPS4.txt");
  450.             map {$_ = "$_\n"} (@WPS4);
  451.             print wp @WPS4;
  452.         print "\t>> Saved at WPS4.txt\n";
  453.         }
  454.     }
  455.    
  456.         elsif ($choice1 eq "WPS5" or $choice1 eq "wps5" or $choice1 eq "" or $choice1 eq "Wps5" or $choice1 eq "6" )
  457.     {
  458.         print "\nExtract Wordpress  3.6.9  sites...\n";
  459.         print "==============================\n";
  460.         IP_id();
  461.         print "Searching for Wordpress(3.6.9) sites\n";
  462.         WPS();
  463.         $n_found = $#WPS5;
  464.         print "\t>> Found $n_found Wordpress sites\n\n";
  465.         print "Do you want to save the result (Y\\n): ";
  466.         $save = <stdin>;
  467.         chomp($save);
  468.         if ($save eq "Y" or $save eq "" or $save eq "y")
  469.         {
  470.             open(wp, ">WPS5.txt");
  471.             map {$_ = "$_\n"} (@WPS5);
  472.             print wp @WPS5;
  473.         print "\t>> Saved at WPS5.txt\n";
  474.         }
  475.     }
  476.    
  477.         elsif ($choice1 eq "WPS6" or $choice1 eq "wps6" or $choice1 eq "" or $choice1 eq "Wps6" or $choice1 eq "7" )
  478.     {
  479.         print "\nExtract Wordpress  3.4  sites...\n";
  480.         print "==============================\n";
  481.         IP_id();
  482.         print "Searching for Wordpress(3.4) sites\n";
  483.         WPS();
  484.         $n_found = $#WPS6;
  485.         print "\t>> Found $n_found Wordpress sites\n\n";
  486.         print "Do you want to save the result (Y\\n): ";
  487.         $save = <stdin>;
  488.         chomp($save);
  489.         if ($save eq "Y" or $save eq "" or $save eq "y")
  490.         {
  491.             open(wp, ">WPS6.txt");
  492.             map {$_ = "$_\n"} (@WPS6);
  493.             print wp @WPS6;
  494.         print "\t>> Saved at WPS6.txt\n";
  495.         }
  496.     }
  497.    
  498.    
  499.         elsif ($choice1 eq "vuln" or $choice1 eq "Vuln" or $choice1 eq "" or $choice1 eq "VULN" or $choice1 eq "8" )
  500.     {
  501.    
  502.     print "\nChoice Version : ( 3.4 , 3.6 , 3.6.9 , 4.7 , 4.7.1 , 4.7.2 , 4.7.4 ) :  ";
  503.     $choice1 = <stdin>;                    
  504.     chomp ($choice1);
  505.    
  506. if ($choice1 eq "4.7" )
  507.  {
  508. print"
  509. \nWordpress 4.7 Vulnerabilities \n
  510. Version 4.7 : \n
  511. 1-Reset API (CVE Details https://goo.gl/pBsQHh ) \n
  512. 2-bypass intended access restrictions (CVE Details  https://goo.gl/6Cch8F ) \n
  513. 3-widget-editing accessibility-mode feature CSRF (CVE Details  https://goo.gl/tHa24Y ) \n
  514. 4-wp-mail.php bypass intended posting restrictions (CVE Details  https://goo.gl/De7xfy ) \n
  515. 5-theme-name fallback functionality in wp-includes/class-wp-theme.php Xss (CVE Details  https://goo.gl/ctebN4 ) \n
  516. 6-remote hijack the authentication of unspecified victims (CVE Details  https://goo.gl/eqjw7V ) \n
  517. 7-Multiple cross-site scripting (XSS) vulnerabilities (CVE Details  https://goo.gl/6B2Zwr ) \n
  518. 8-REST API implementation (CVE Details  https://goo.gl/hLY2PT ) \n ";
  519.  }
  520.  
  521.  elsif ($choice1 eq "4.7.1" )
  522.  {
  523. print"
  524. \nWordpress 4.7.1 Vulnerabilities \n
  525. Version 4.7.1 : \n
  526. 1-REST API (CVE Details https://goo.gl/5ThgVN ) \n
  527. 2-Cross-site scripting (XSS) Vulnerability (CVE Details https://goo.gl/b18rKH) \n
  528. 3-SQL injection vulnerability in wp-includes/class-wp-query.php (CVE Details https://goo.gl/r298U7 ) \n
  529. 4-bypass intended access restrictions (CVE Details https://goo.gl/Vr75rt ) \n ";
  530. }
  531. elsif ($choice1 eq "4.7.2" )
  532.  {
  533. print"
  534. \nWordpress 4.7.2 Vulnerabilities \n
  535. Version 4.7.2 : \n
  536. 1-REST API (CVE Details https://goo.gl/z8VHBM ) \n
  537. 2-CSRF in wp-admin/includes/class-wp-press-this.php (CVE Details https://goo.gl/rgshdK ) \n
  538. 3-Xss in wp-admin/js/tags-box.js (CVE Details https://goo.gl/59S9JU ) \n
  539. 4-Xss in wp-includes/embed.php (CVE Details https://goo.gl/mM7KLX ) \n
  540. 5- files can be deleted by administrators (CVE Details https://goo.gl/fYR2Rs ) \n
  541. 6-Redirect URL in wp-includes/pluggable.php (CVE Details https://goo.gl/6jB7Vw ) \n
  542. 7-Xss in wp-includes/media.php (CVE Details https://goo.gl/vSRGsV ) \n";
  543. }
  544. elsif ($choice1 eq "4.7.4" )
  545.   {
  546. print
  547. "\nWordpress 4.7.4 Vulnerabilities \n
  548. 1-redirect validation in the HTTP class (CVE Details https://goo.gl/V6RtWV ) \n
  549. 2-lack of capability checks for post meta data in the XML-RPC API (CVE Details https://goo.gl/65L65N ) \n
  550. 3-Cross Site Request Forgery (CVE Details https://goo.gl/xnYB5J ) \n
  551. 4-cross-site scripting (CVE Details https://goo.gl/R1wfLp ) \n
  552. 5-improper handling of post meta data values in the XML-RPC API (CVE Details https://goo.gl/jY5ZV6  ) \n
  553. 6-cross-site scripting (CVE Details https://goo.gl/q7aqh4  ) \n
  554. 7-Host HTTP header for a password-reset e-mail message (CVE Details https://goo.gl/KpYMKr ) \n";
  555.  }
  556.  elsif ($choice1 eq "3.6" )
  557.   {
  558. print"
  559. \nWordpress 3.6 Vulnerabilities \n
  560. 1-denial of service (CPU consumption) via a large document (CVE Details https://goo.gl/sPLZg6 ) \n
  561. 2-denial of service (memory and CPU consumption) via a crafted XML document (CVE Details https://goo.gl/uJ6Gf1 ) \n
  562. 3-inject arbitrary web script or HTML, and obtain Super Admin privileges (CVE Details https://goo.gl/1zt29y ) \n
  563. 4-obtain access via a forged cookie (CVE Details https://goo.gl/Hykwpa ) \n
  564. 5-remote authenticated users to publish posts by leveraging the Contributor role (CVE Details https://goo.gl/h6kcqo ) \n
  565. 6-remote authenticated users to conduct cross-site scripting (XSS) (CVE Details https://goo.gl/6EyKz3 ) \n
  566. 7-cross-site scripting (XSS) (CVE Details https://www.cvedetails.com/cve/CVE-2013-5738/ ) \n
  567. 8-remote authenticated users to spoof the authorship of a post (CVE Details https://goo.gl/ahiQTG ) \n
  568. 9-HTTP redirect (CVE Details https://goo.gl/bJFjVD ) \n
  569. 10-execute arbitrary code by triggering erroneous PHP unserialize operations (CVE Details https://goo.gl/X41fuS ) \n";
  570. }
  571.  
  572. elsif ($choice1 eq "3.4" )
  573.  {
  574. print"
  575. \nWordpress 3.4 Vulnerabilities \n
  576. 1-does not limit the number of elements in an XML document (CVE Details https://goo.gl/WCqhjE ) \n
  577. 2-denial of service (memory and CPU consumption) (CVE Details https://goo.gl/nWD1Kv ) \n
  578. 3-obtain access via a forged cookie (CVE Details https://goo.gl/2iF25x ) \n
  579. 4-send HTTP requests to intranet servers (CVE Details https://goo.gl/L9hmd6 )\n
  580. 5-remote authenticated users to bypass intended access (CVE Details https://goo.gl/jkbjXL ) \n
  581. 6-Cross-site scripting (XSS) (CVE Details https://goo.gl/sDHWs7 ) \n";
  582. }
  583. elsif ($choice1 eq "3.6.9" )
  584.   {
  585. print"
  586. \nWordpress 3.6.9 Vulnerabilities \n
  587. 1-hijack the authentication of administrators (CVE Details https://goo.gl/ZC31nm ) \n
  588. 2-bypass intended password-change restrictions  (CVE Details https://goo.gl/C9QntR ) \n
  589. 3-obtain sensitive revision-history information to read a post (CVE Details https://goo.gl/bLeCm1 ) \n
  590. 4-Open redirect vulnerability in the wp_validate_redirect function (CVE Details https://goo.gl/eZfcR3 ) \n
  591. 5-Cross-site scripting (XSS) (CVE Details https://goo.gl/zMGSHa ) \n";
  592. }
  593.  
  594.  
  595.  
  596. }
  597. }
  598. Into();
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement