Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [+] URL: http://www.transitonacional.gob.ni/
- [+] Started: Wed Jan 16 07:08:30 2019
- Interesting Finding(s):
- [+] http://www.transitonacional.gob.ni/
- | Interesting Entries:
- | - Server: nginx/1.14.1
- | - X-Powered-By: PHP/5.2.17
- | - X-Acc-Exp: 600
- | - X-Proxy-Cache: EXPIRED www.transitonacional.gob.ni
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://www.transitonacional.gob.ni/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://www.transitonacional.gob.ni/xmlrpc.php
- | Found By: Link Tag (Passive Detection)
- | Confidence: 100%
- | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://www.transitonacional.gob.ni/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] Upload directory has listing enabled: http://www.transitonacional.gob.ni/wp-content/uploads/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] WordPress version 4.4.2 identified.
- | Detected By: Emoji Settings (Passive Detection)
- | - http://www.transitonacional.gob.ni/, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=4.4.2'
- | Confirmed By: Plugin And Theme Query Parameter In Homepage (Passive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/css/bootstrap-accordion.min.css?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css/flexslider.css?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/css/prettyPhoto.css?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/js/transito_grafico.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/amcharts.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/serial.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/pie.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/amexport.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/rgbcolor.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/canvg.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/amcharts_3.4.10.free/exporting/filesaver.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/scripts/itro-scripts.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/modernizr.min.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/customscript.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/jquery.flexslider-min.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/js/jquery.prettyPhoto.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.cycle.all.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.metadata.v2.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/jquery.touchwipe.1.1.1.js?ver=4.4.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/slideshow.js?ver=4.4.2
- |
- | [!] 54 vulnerabilities identified:
- |
- | [!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8473
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
- |
- | [!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8474
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
- | - https://codex.wordpress.org/Version_4.5
- | - https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
- |
- | [!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
- | Fixed in: 4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8475
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
- | - https://codex.wordpress.org/Version_4.5
- |
- | [!] Title: WordPress 4.2-4.5.1 - MediaElement.js Reflected Cross-Site Scripting (XSS)
- | Fixed in: 4.5.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/8488
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4567
- | - https://wordpress.org/news/2016/05/wordpress-4-5-2/
- | - https://github.com/WordPress/WordPress/commit/a493dc0ab5819c8b831173185f1334b7c3e02e36
- | - https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
- |
- | [!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
- | Fixed in: 4.4.3
- | References:
- | - https://wpvulndb.com/vulnerabilities/8489
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
- | - https://wordpress.org/news/2016/05/wordpress-4-5-2/
- | - https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
- | - https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
- |
- | [!] Title: WordPress 4.2-4.5.2 - Authenticated Attachment Name Stored XSS
- | Fixed in: 4.4.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/8518
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
- |
- | [!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
- | Fixed in: 4.4.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/8519
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
- | - https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
- |
- | [!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
- | Fixed in: 4.4.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/8520
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
- | - https://wordpress.org/news/2016/06/wordpress-4-5-3/
- | - https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
- |
- | [!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
- | Fixed in: 4.4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8615
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
- | - https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
- | - http://seclists.org/fulldisclosure/2016/Sep/6
- |
- | [!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
- | Fixed in: 4.4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8616
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
- | - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- |
- | [!] Title: WordPress 4.3-4.7 - Remote Code Execution (RCE) in PHPMailer
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8714
- | - https://www.wordfence.com/blog/2016/12/phpmailer-vulnerability/
- | - https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/24767c76d359231642b0ab48437b64e8c6c7f491
- | - http://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
- | - https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_phpmailer_host_header
- |
- | [!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8716
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
- | - https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8718
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
- | - https://www.mehmetince.net/low-severity-wordpress/
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
- |
- | [!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8719
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
- | - https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8720
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
- | - https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- | Fixed in: 4.4.6
- | References:
- | - https://wpvulndb.com/vulnerabilities/8721
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
- | - https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- | - https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
- |
- | [!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
- | Fixed in: 4.4.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8729
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
- |
- | [!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
- | Fixed in: 4.4.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8730
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
- |
- | [!] Title: WordPress 4.3.0-4.7.1 - Cross-Site Scripting (XSS) in posts list table
- | Fixed in: 4.4.7
- | References:
- | - https://wpvulndb.com/vulnerabilities/8731
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5612
- | - https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
- | - https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849
- |
- | [!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- | Fixed in: 4.4.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8765
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
- | - https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
- | - http://seclists.org/oss-sec/2017/q1/563
- |
- | [!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
- | Fixed in: 4.4.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8766
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
- |
- | [!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
- | Fixed in: 4.4.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8768
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
- | - https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
- |
- | [!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
- | Fixed in: 4.4.8
- | References:
- | - https://wpvulndb.com/vulnerabilities/8770
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
- | - https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
- | - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
- | - http://seclists.org/oss-sec/2017/q1/562
- | - https://hackerone.com/reports/153093
- |
- | [!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
- | References:
- | - https://wpvulndb.com/vulnerabilities/8807
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
- | - https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
- | - http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
- | - https://core.trac.wordpress.org/ticket/25239
- |
- | [!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8815
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
- | - https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8816
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8817
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
- |
- | [!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8818
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
- | - https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
- |
- | [!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8819
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
- | - https://hackerone.com/reports/203515
- | - https://hackerone.com/reports/203515
- |
- | [!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
- | Fixed in: 4.4.10
- | References:
- | - https://wpvulndb.com/vulnerabilities/8820
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
- | - https://wordpress.org/news/2017/05/wordpress-4-7-5/
- | - https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
- |
- | [!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
- | Fixed in: 4.4.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8905
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
- |
- | [!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
- | Fixed in: 4.7.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8906
- | - https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
- | - https://wpvulndb.com/vulnerabilities/8905
- |
- | [!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
- | Fixed in: 4.4.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8910
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41398
- |
- | [!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
- | Fixed in: 4.4.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8911
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41457
- |
- | [!] Title: WordPress 4.4-4.8.1 - Cross-Site Scripting (XSS) in oEmbed
- | Fixed in: 4.4.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8913
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14724
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41448
- |
- | [!] Title: WordPress 4.2.3-4.8.1 - Authenticated Cross-Site Scripting (XSS) in Visual Editor
- | Fixed in: 4.4.11
- | References:
- | - https://wpvulndb.com/vulnerabilities/8914
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14726
- | - https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/changeset/41395
- | - https://blog.sucuri.net/2017/09/stored-cross-site-scripting-vulnerability-in-wordpress-4-8-1.html
- |
- | [!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
- | Fixed in: 4.4.12
- | References:
- | - https://wpvulndb.com/vulnerabilities/8941
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
- | - https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
- | - https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
- | - https://twitter.com/ircmaxell/status/923662170092638208
- | - https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
- |
- | [!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
- | Fixed in: 4.4.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8966
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
- |
- | [!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
- | Fixed in: 4.4.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8967
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
- |
- | [!] Title: WordPress 4.3.0-4.9 - HTML Language Attribute Escaping
- | Fixed in: 4.4.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8968
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17093
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/3713ac5ebc90fb2011e98dfd691420f43da6c09a
- |
- | [!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
- | Fixed in: 4.4.13
- | References:
- | - https://wpvulndb.com/vulnerabilities/8969
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
- | - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
- |
- | [!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
- | Fixed in: 4.4.14
- | References:
- | - https://wpvulndb.com/vulnerabilities/9006
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
- | - https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
- | - https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
- | - https://core.trac.wordpress.org/ticket/42720
- |
- | [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- | References:
- | - https://wpvulndb.com/vulnerabilities/9021
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- | - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- | - https://github.com/quitten/doser.py
- | - https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- |
- | [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- | Fixed in: 4.4.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/9053
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- |
- | [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- | Fixed in: 4.4.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/9054
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- |
- | [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- | Fixed in: 4.4.15
- | References:
- | - https://wpvulndb.com/vulnerabilities/9055
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- |
- | [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- | Fixed in: 4.4.16
- | References:
- | - https://wpvulndb.com/vulnerabilities/9100
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- | - https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- | - http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- | - https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- | - https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- | - https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated File Delete
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9169
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Post Type Bypass
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9170
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
- |
- | [!] Title: WordPress <= 5.0 - PHP Object Injection via Meta Data
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9171
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9172
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9173
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
- |
- | [!] Title: WordPress <= 5.0 - User Activation Screen Search Engine Indexing
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9174
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
- | Fixed in: 4.4.17
- | References:
- | - https://wpvulndb.com/vulnerabilities/9175
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
- [+] WordPress theme in use: newsmag
- | Location: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/
- | Last Updated: 2018-08-09T00:00:00.000Z
- | [!] The version is out of date, the latest version is 2.4.0
- | Style URL: http://www.transitonacional.gob.ni/wp-content/themes/newsmag/style.css
- | Style Name: NewsMag
- | Style URI: http://mythemeshop.com/themes/newsmag
- | Description: NewsMag is a three column, responsive WordPress magazine theme that is built for sites with lots of ...
- | Author: MyThemeShop
- | Author URI: http://mythemeshop.com/
- |
- | Detected By: Css Style (Passive Detection)
- | Confirmed By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.0 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/themes/newsmag/style.css, Match: 'Version: 1.0'
- [+] Enumerating All Plugins
- [+] Checking Plugin Versions
- [i] Plugin(s) Identified:
- [+] contact-form-7
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/
- | Last Updated: 2018-12-18T18:05:00.000Z
- | [!] The version is out of date, the latest version is 5.1.1
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: Contact Form 7 <= 5.0.3 - register_post_type() Privilege Escalation
- | Fixed in: 5.0.4
- | References:
- | - https://wpvulndb.com/vulnerabilities/9127
- | - https://contactform7.com/2018/09/04/contact-form-7-504/
- | - https://plugins.trac.wordpress.org/changeset/1935726/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934594/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934343/contact-form-7
- | - https://plugins.trac.wordpress.org/changeset/1934327/contact-form-7
- | - https://www.ripstech.com/php-security-calendar-2018/#day-18
- |
- | Version: 4.2.2 (20% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.2.2
- | - http://www.transitonacional.gob.ni/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.2.2
- [+] easy-collapse-accordion
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/
- | Latest Version: 1.0 (up to date)
- | Last Updated: 2013-12-26T00:50:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 4.5 (80% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/plugins/easy-collapse-accordion/README.md
- [+] itro-popup
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/itro-popup/
- | Latest Version: 5.0.2
- | Last Updated: 2017-07-02T08:03:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] meteor-slides
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/
- | Last Updated: 2017-06-09T20:39:00.000Z
- | [!] The version is out of date, the latest version is 1.5.6
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.5.4 (100% confidence)
- | Detected By: Style Comment (Aggressive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/css/meteor-slides.css, Match: 'Stylesheet for the Meteor Slides 1.5.4 slideshow'
- | Confirmed By: Javascript Comment (Aggressive Detection)
- | - http://www.transitonacional.gob.ni/wp-content/plugins/meteor-slides/js/slideshow.js, Match: 'Script for the Meteor Slides 1.5.4 slideshow'
- [+] transito_grafico
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/transito_grafico/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] wp-super-cache
- | Location: http://www.transitonacional.gob.ni/wp-content/plugins/wp-super-cache/
- | Latest Version: 1.6.4
- | Last Updated: 2018-12-20T09:36:00.000Z
- |
- | Detected By: Comment (Passive Detection)
- |
- | [!] 10 vulnerabilities identified:
- |
- | [!] Title: WP-Super-Cache 1.3 - Remote Code Execution
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6623
- | - http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- | - http://wordpress.org/support/topic/pwn3d
- | - http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
- |
- | [!] Title: WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6624
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6625
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6626
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6627
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6628
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS
- | Fixed in: 1.3.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/6629
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
- |
- | [!] Title: WP Super Cache <= 1.4.2 - Stored Cross-Site Scripting (XSS)
- | Fixed in: 1.4.3
- | References:
- | - https://wpvulndb.com/vulnerabilities/7889
- | - http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
- |
- | [!] Title: WP Super Cache <= 1.4.4 - Cross-Site Scripting (XSS)
- | Fixed in: 1.4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8197
- | - http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- |
- | [!] Title: WP Super Cache <= 1.4.4 - PHP Object Injection
- | Fixed in: 1.4.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8198
- | - http://z9.io/2015/09/25/wp-super-cache-1-4-5/
- |
- | The version could not be determined.
- [+] Enumerating Config Backups
- Checking Config Backups - Time: 00:00:06 <===> (21 / 21) 100.00% Time: 00:00:06
- ///////////////////////////////////////////////////////////////////////////////////
- [i] User(s) Identified:
- [+] admin
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] comisionado-ivan
- | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- ///////////////////////////////////////////////////////////////////////////////////
- [i] User(s) Identified:
- [+] admin
- | Detected By: Author Posts - Author Pattern (Passive Detection)
- | Confirmed By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] comisionado-ivan
- | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement