Himeshvyas26

dailypakistan new wp exploit

Mar 24th, 2019
409
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.65 KB | None | 0 0
  1. ┏━Target: dailypakistan.pk ┃
  2. ┠── CMS: WordPress ┃ │ ┃ ├── Version: 4.8.1
  3. ┃ ╰── URL: https://wordpress.org
  4. ┠──[WordPress Deepscan]
  5. ┃ │
  6. ┃ ├── Readme file found: https://dailypakistan.pk//readme.html ┃ ├── License file: https://dailypakistan.pk//license.txt ┃ ├── Changelog: https://codex.wordpress.org/Version_4.8.1
  7. ┃ ├── User registration enabled: https://dailypakistan.pk//wp-login.php?action=register ┃ │
  8. ┃ ├── Usernames harvested: 1
  9. ┃ │ ╰── dpadmin
  10. ┃ │
  11. ┃ ╰── Version vulnerabilities: 27
  12. ┃ │
  13. ┃ │
  14. ┃ ├── WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
  15. ┃ │ │
  16. ┃ │ ├── Type: SQLI
  17. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8905
  18. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  19. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
  20. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
  21. ┃ │ ╰── Fixed In Version: 4.8.2
  22. ┃ │
  23. ┃ ├── WordPress 2.9.2-4.8.1 - Open Redirect
  24. ┃ │ │
  25. ┃ │ ├── Type: REDIRECT
  26. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8910
  27. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
  28. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  29. ┃ │ ├── Reference: https://core.trac.wordpress.org/changeset/41398
  30. ┃ │ ╰── Fixed In Version: 4.8.2
  31. ┃ │
  32. ┃ ├── WordPress 3.0-4.8.1 - Path Traversal in Unzipping
  33. ┃ │ │
  34. ┃ │ ├── Type: LFI
  35. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8911
  36. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
  37. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  38. ┃ │ ├── Reference: https://core.trac.wordpress.org/changeset/41457
  39. ┃ │ ╰── Fixed In Version: 4.8.2
  40. ┃ │
  41. ┃ ├── WordPress 4.4-4.8.1 - Path Traversal in Customizer
  42. ┃ │ │
  43. ┃ │ ├── Type: LFI
  44. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8912
  45. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14722
  46. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  47. ┃ │ ├── Reference: https://core.trac.wordpress.org/changeset/41397
  48. ┃ │ ╰── Fixed In Version: 4.8.2
  49. ┃ │
  50. ┃ ├── WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
  51. ┃ │ │
  52. ┃ │ ├── Type: XSS
  53. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8913
  54. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
  55. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  56. ┃ │ ├── Reference: https://core.trac.wordpress.org/changeset/41448
  57. ┃ │ ╰── Fixed In Version: 4.8.2
  58. ┃ │
  59. ┃ ├── WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
  60. ┃ │ │
  61. ┃ │ ├── Type: XSS
  62. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8914
  63. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
  64. ┃ │ ├── Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
  65. ┃ │ ├── Reference: https://core.trac.wordpress.org/changeset/41395
  66. ┃ │ ├── Reference: https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
  67. ┃ │ ╰── Fixed In Version: 4.8.2
  68. ┃ │
  69. ┃ ├── WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
  70. ┃ │ │
  71. ┃ │ ├── Type: UNKNOWN
  72. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8807
  73. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
  74. ┃ │ ├── Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
  75. ┃ │ ├── Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
  76. ┃ │ ├── Reference: https://core.trac.wordpress.org/ticket/25239
  77. ┃ │ ╰── Fixed In Version: None
  78. ┃ │
  79. ┃ ├── WordPress <= 4.8.2 - $wpdb->prepare() Weakness
  80. ┃ │ │
  81. ┃ │ ├── Type: SQLI
  82. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8941
  83. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
  84. ┃ │ ├── Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
  85. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
  86. ┃ │ ├── Reference: https://twitter.com/ircmaxell/status/923662170092638208
  87. ┃ │ ├── Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
  88. ┃ │ ╰── Fixed In Version: 4.8.3
  89. ┃ │
  90. ┃ ├── WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
  91. ┃ │ │
  92. ┃ │ ├── Type: BYPASS
  93. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8966
  94. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
  95. ┃ │ ├── Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  96. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
  97. ┃ │ ╰── Fixed In Version: 4.8.4
  98. ┃ │
  99. ┃ ├── WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
  100. ┃ │ │
  101. ┃ │ ├── Type: XSS
  102. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8967
  103. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
  104. ┃ │ ├── Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  105. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
  106. ┃ │ ╰── Fixed In Version: 4.8.4
  107. ┃ │
  108. ┃ ├── WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
  109. ┃ │ │
  110. ┃ │ ├── Type: XSS
  111. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8968
  112. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
  113. ┃ │ ├── Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  114. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
  115. ┃ │ ╰── Fixed In Version: 4.8.4
  116. ┃ │
  117. ┃ ├── WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
  118. ┃ │ │
  119. ┃ │ ├── Type: UNKNOWN
  120. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/8969
  121. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
  122. ┃ │ ├── Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
  123. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
  124. ┃ │ ╰── Fixed In Version: 4.8.4
  125. ┃ │
  126. ┃ ├── WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
  127. ┃ │ │
  128. ┃ │ ├── Type: XSS
  129. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9006
  130. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
  131. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
  132. ┃ │ ├── Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
  133. ┃ │ ├── Reference: https://core.trac.wordpress.org/ticket/42720
  134. ┃ │ ╰── Fixed In Version: 4.8.5
  135. ┃ │
  136. ┃ ├── WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
  137. ┃ │ │
  138. ┃ │ ├── Type: DOS
  139. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9021
  140. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
  141. ┃ │ ├── Reference: https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
  142. ┃ │ ├── Reference: https://github.com/quitten/doser.py
  143. ┃ │ ├── Reference: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
  144. ┃ │ ╰── Fixed In Version: None
  145. ┃ │
  146. ┃ ├── WordPress 3.7-4.9.4 - Remove localhost Default
  147. ┃ │ │
  148. ┃ │ ├── Type: UNKNOWN
  149. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9053
  150. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
  151. ┃ │ ├── Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
  152. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
  153. ┃ │ ╰── Fixed In Version: 4.8.6
  154. ┃ │
  155. ┃ ├── WordPress 3.7-4.9.4 - Use Safe Redirect for Login
  156. ┃ │ │
  157. ┃ │ ├── Type: REDIRECT
  158. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9054
  159. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
  160. ┃ │ ├── Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
  161. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
  162. ┃ │ ╰── Fixed In Version: 4.8.6
  163. ┃ │
  164. ┃ ├── WordPress 3.7-4.9.4 - Escape Version in Generator Tag
  165. ┃ │ │
  166. ┃ │ ├── Type: XSS
  167. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9055
  168. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
  169. ┃ │ ├── Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
  170. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
  171. ┃ │ ╰── Fixed In Version: 4.8.6
  172. ┃ │
  173. ┃ ├── WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
  174. ┃ │ │
  175. ┃ │ ├── Type: UNKNOWN
  176. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9100
  177. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
  178. ┃ │ ├── Reference: https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
  179. ┃ │ ├── Reference: http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
  180. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
  181. ┃ │ ├── Reference: https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
  182. ┃ │ ├── Reference: https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
  183. ┃ │ ╰── Fixed In Version: 4.8.7
  184. ┃ │
  185. ┃ ├── WordPress <= 5.0 - Authenticated File Delete
  186. ┃ │ │
  187. ┃ │ ├── Type: UNKNOWN
  188. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9169
  189. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
  190. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  191. ┃ │ ╰── Fixed In Version: 4.8.8
  192. ┃ │
  193. ┃ ├── WordPress <= 5.0 - Authenticated Post Type Bypass
  194. ┃ │ │
  195. ┃ │ ├── Type: BYPASS
  196. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9170
  197. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
  198. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  199. ┃ │ ├── Reference: https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
  200. ┃ │ ╰── Fixed In Version: 4.8.8
  201. ┃ │
  202. ┃ ├── WordPress <= 5.0 - PHP Object Injection via Meta Data
  203. ┃ │ │
  204. ┃ │ ├── Type: OBJECTINJECTION
  205. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9171
  206. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
  207. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  208. ┃ │ ╰── Fixed In Version: 4.8.8
  209. ┃ │
  210. ┃ ├── WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
  211. ┃ │ │
  212. ┃ │ ├── Type: XSS
  213. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9172
  214. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
  215. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  216. ┃ │ ╰── Fixed In Version: 4.8.8
  217. ┃ │
  218. ┃ ├── WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
  219. ┃ │ │
  220. ┃ │ ├── Type: XSS
  221. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9173
  222. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
  223. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  224. ┃ │ ├── Reference: https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
  225. ┃ │ ╰── Fixed In Version: 4.8.8
  226. ┃ │
  227. ┃ ├── WordPress <= 5.0 - User Activation Screen Search Engine Indexing
  228. ┃ │ │
  229. ┃ │ ├── Type: UNKNOWN
  230. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9174
  231. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
  232. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
  233. ┃ │ ╰── Fixed In Version: 4.8.8
  234. ┃ │
  235. ┃ ├── WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
  236. ┃ │ │
  237. ┃ │ ├── Type: XSS
  238. ┃ │ ├── Link: http://wpvulndb.com/vulnerabilities/9175
  239. ┃ │ ├── CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
  240. ┃ │ ├── Reference: https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
Add Comment
Please, Sign In to add comment