Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ~/wpscan$ ./wpscan.rb --url http://www.stemwijzer.nl --enumerate u
- _______________________________________________________________
- __ _______ _____
- \ \ / / __ \ / ____|
- \ \ /\ / /| |__) | (___ ___ __ _ _ __
- \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
- \ /\ / | | ____) | (__| (_| | | | |
- \/ \/ |_| |_____/ \___|\__,_|_| |_|
- WordPress Security Scanner by the WPScan Team
- Version 2.9.1
- Sponsored by Sucuri - https://sucuri.net
- @_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
- _______________________________________________________________
- [i] The remote host tried to redirect to: https://stemwijzer.nl/
- [?] Do you want follow the redirection ? [Y]es [N]o [A]bort, default: [N]y
- [+] URL: https://stemwijzer.nl/
- [+] Started: Mon Feb 6 12:09:34 2017
- [+] robots.txt available under: 'https://stemwijzer.nl/robots.txt'
- [+] Interesting entry from robots.txt: https://stemwijzer.nl/wp-admin/
- [+] Interesting entry from robots.txt: https://stemwijzer.nl/wp-includes/
- [+] Interesting entry from robots.txt: https://stemwijzer.nl/wp-content/plugins/
- [+] Interesting entry from robots.txt: https://stemwijzer.nl/wp-content/themes/
- [+] Interesting entry from robots.txt: https://stemwijzer.nl/feed/
- [+] Interesting entry from robots.txt: */feed/
- [!] The WordPress 'https://stemwijzer.nl/readme.html' file exists exposing a version number
- [+] Interesting header: SERVER: nginx/1.6.2
- [+] Interesting header: STRICT-TRANSPORT-SECURITY: max-age=15552000
- [+] Interesting header: WP-SUPER-CACHE: Served supercache file from PHP
- [+] XML-RPC Interface available under: https://stemwijzer.nl/xmlrpc.php
- [+] WordPress version 4.7 identified from readme (Released on 2016-12-06)
- [!] 12 vulnerabilities identified from the version number
- [!] Title: WordPress 4.3-4.7 - Potential Remote Command Execution (RCE) in PHPMailer
- Reference: https://wpvulndb.com/vulnerabilities/8714
- Reference: https://www.wordfence.com/blog/2016/12/phpmailer-vulnerability/
- Reference: https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 4.7 - User Information Disclosure via REST API
- Reference: https://wpvulndb.com/vulnerabilities/8715
- Reference: https://www.wordfence.com/blog/2016/12/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7/
- Reference: https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5487
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- Reference: https://wpvulndb.com/vulnerabilities/8716
- Reference: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 4.7 - Cross-Site Request Forgery (CSRF) via Flash Upload
- Reference: https://wpvulndb.com/vulnerabilities/8717
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5489
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- Reference: https://wpvulndb.com/vulnerabilities/8718
- Reference: https://www.mehmetince.net/low-severity-wordpress/
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- [i] Fixed in: 4.7.1
- [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- Reference: https://wpvulndb.com/vulnerabilities/8719
- Reference: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- Reference: https://wpvulndb.com/vulnerabilities/8720
- Reference: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- Reference: https://wpvulndb.com/vulnerabilities/8721
- Reference: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- [i] Fixed in: 4.7.1
- [!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
- Reference: https://wpvulndb.com/vulnerabilities/8729
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
- [i] Fixed in: 4.7.2
- [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- Reference: https://wpvulndb.com/vulnerabilities/8730
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- [i] Fixed in: 4.7.2
- [!] Title: WordPress 4.3.0-4.7.1 - Cross-Site Scripting (XSS) in posts list table
- Reference: https://wpvulndb.com/vulnerabilities/8731
- Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- Reference: https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849
- Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
- [i] Fixed in: 4.7.2
- [!] Title: WordPress 4.7.0-4.7.1 - Unauthenticated Page/Post Content Modification via REST API
- Reference: https://wpvulndb.com/vulnerabilities/8734
- Reference: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
- Reference: https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html
- Reference: https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab
- Reference: https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a1232926f7
- [i] Fixed in: 4.7.2
- [+] Enumerating plugins from passive detection ...
- | 1 plugin found:
- [+] Name: wp-super-cache - v1.4.9
- | Latest version: 1.4.9 (up to date)
- | Location: https://stemwijzer.nl/wp-content/plugins/wp-super-cache/
- | Readme: https://stemwijzer.nl/wp-content/plugins/wp-super-cache/readme.txt
- [+] Enumerating usernames ...
- [+] We did not enumerate any usernames
- [+] Finished: Mon Feb 6 12:10:05 2017
- [+] Requests Done: 81
- [+] Memory used: 78.73 MB
- [+] Elapsed time: 00:00:30
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement