Advertisement
Guest User

anonhq

a guest
Nov 7th, 2016
141
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.34 KB | None | 0 0
  1. [+] URL: http://anonhq.com/
  2. [+] Started: Tue Nov 8 00:53:59 2016
  3.  
  4. [+] robots.txt available under: 'http://anonhq.com/robots.txt'
  5. [+] Interesting entry from robots.txt: http://anonhq.com/wp-content/plugins/
  6. [!] The WordPress 'http://anonhq.com/readme.html' file exists exposing a version number
  7. [+] Interesting header: CF-RAY: 2fe14118848a2fcf-MAA
  8. [+] Interesting header: LINK: <http://anonhq.com/wp-json/>; rel="https://api.w.org/"
  9. [+] Interesting header: LINK: <http://anonhq.com/>; rel=shortlink
  10. [+] Interesting header: SERVER: cloudflare-nginx
  11. [+] Interesting header: X-UA-COMPATIBLE: IE=edge
  12.  
  13. [+] WordPress version 4.6.1 identified from meta generator
  14.  
  15. [+] WordPress theme in use: today
  16.  
  17. [+] Name: today
  18. | Location: http://anonhq.com/wp-content/themes/today/
  19. | Style URL: http://anonhq.com/wp-content/themes/today/style.css
  20. | Description:
  21.  
  22. [+] Enumerating plugins from passive detection ...
  23. | 4 plugins found:
  24.  
  25. [+] Name: js_composer
  26. | Location: http://anonhq.com/wp-content/plugins/js_composer/
  27.  
  28. [+] Name: responsivevoice-text-to-speech
  29. | Location: http://anonhq.com/wp-content/plugins/responsivevoice-text-to-speech/
  30.  
  31. [+] Name: wordpress-popular-posts
  32. | Location: http://anonhq.com/wp-content/plugins/wordpress-popular-posts/
  33.  
  34. [+] Name: wp-super-cache
  35. | Location: http://anonhq.com/wp-content/plugins/wp-super-cache/
  36.  
  37. [!] We could not determine a version so all vulnerabilities are printed out
  38.  
  39. [!] Title: WP-Super-Cache 1.3 - Remote Code Execution
  40. Reference: https://wpvulndb.com/vulnerabilities/6623
  41. Reference: http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
  42. Reference: http://wordpress.org/support/topic/pwn3d
  43. Reference: http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
  44. [i] Fixed in: 1.3.1
  45.  
  46. [!] Title: WP Super Cache 1.3 - trunk/wp-cache.php wp_nonce_url Function URI XSS
  47. Reference: https://wpvulndb.com/vulnerabilities/6624
  48. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  49. Reference: http://osvdb.org/show/osvdb/92832
  50. [i] Fixed in: 1.3.1
  51.  
  52. [!] Title: WP Super Cache 1.3 - trunk/plugins/wptouch.php URI XSS
  53. Reference: https://wpvulndb.com/vulnerabilities/6625
  54. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  55. Reference: http://osvdb.org/show/osvdb/92831
  56. [i] Fixed in: 1.3.1
  57.  
  58. [!] Title: WP Super Cache 1.3 - trunk/plugins/searchengine.php URI XSS
  59. Reference: https://wpvulndb.com/vulnerabilities/6626
  60. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  61. Reference: http://osvdb.org/show/osvdb/92830
  62. [i] Fixed in: 1.3.1
  63.  
  64. [!] Title: WP Super Cache 1.3 - trunk/plugins/domain-mapping.php URI XSS
  65. Reference: https://wpvulndb.com/vulnerabilities/6627
  66. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  67. Reference: http://osvdb.org/show/osvdb/92829
  68. [i] Fixed in: 1.3.1
  69.  
  70. [!] Title: WP Super Cache 1.3 - trunk/plugins/badbehaviour.php URI XSS
  71. Reference: https://wpvulndb.com/vulnerabilities/6628
  72. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  73. Reference: http://osvdb.org/show/osvdb/92828
  74. [i] Fixed in: 1.3.1
  75.  
  76. [!] Title: WP Super Cache 1.3 - trunk/plugins/awaitingmoderation.php URI XSS
  77. Reference: https://wpvulndb.com/vulnerabilities/6629
  78. Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2008
  79. Reference: http://osvdb.org/show/osvdb/92827
  80. [i] Fixed in: 1.3.1
  81.  
  82. [!] Title: WP Super Cache <= 1.4.2 - Persistent Cross-Site Scripting (XSS)
  83. Reference: https://wpvulndb.com/vulnerabilities/7889
  84. Reference: http://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html
  85. [i] Fixed in: 1.4.3
  86.  
  87. [+] Enumerating usernames ...
  88. [+] Identified the following 7 user/s:
  89. +----+-------------+----------------------+
  90. | Id | Login | Name |
  91. +----+-------------+----------------------+
  92. | 1 | wpadmin | hqanon |
  93. | 2 | anonvoid | AnonVoid (Moderator) |
  94. | 4 | anonwatcher | AnonWatcher |
  95. | 6 | anondos | Anon.Dos |
  96. | 8 | anonev | EV |
  97. | 9 | conn | CoNN |
  98. | 10 | vandita | Vandita |
  99. +----+-------------+----------------------+
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement