Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- _______________________________________________________________
- __ _______ _____
- \ \ / / __ \ / ____|
- \ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
- \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
- \ /\ / | | ____) | (__| (_| | | | |
- \/ \/ |_| |_____/ \___|\__,_|_| |_|
- WordPress Security Scanner by the WPScan Team
- Version 3.3.1
- Sponsored by Sucuri - https://sucuri.net
- @_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
- _______________________________________________________________
- [32m[+][0m URL: https://www.rs2.com/
- [32m[+][0m Started: Tue Feb 19 10:02:23 2019
- Interesting Finding(s):
- [32m[+][0m https://www.rs2.com/
- | Interesting Entries:
- | - Referrer-Policy: strict-origin-when-cross-origin
- | - X-Server: 1
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [32m[+][0m WordPress version 4.9.9 identified.
- | Detected By: Emoji Settings (Passive Detection)
- | - https://www.rs2.com/, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=4.9.9'
- | Confirmed By: Most Common Wp Includes Query Parameter In Homepage (Passive Detection)
- | - https://www.rs2.com/wp-includes/css/dashicons.min.css?ver=4.9.9
- | - https://www.rs2.com/wp-includes/js/wp-embed.min.js?ver=4.9.9
- [32m[+][0m WordPress theme in use: rs2
- | Location: https://www.rs2.com/wp-content/themes/rs2/
- | Style URL: https://www.rs2.com/wp-content/themes/rs2/style.css?ver=1.0
- | Style Name: RS2
- | Style URI: www.rs2.com
- | Description: RS2 Customers: all around the world RS2 Customers expand their relationship with RS2 year on year....
- | Author: ICON
- | Author URI: http://www.icon.com.mt
- |
- | Detected By: Css Style (Passive Detection)
- |
- | Version: 0.1 (80% confidence)
- | Detected By: Style (Passive Detection)
- | - https://www.rs2.com/wp-content/themes/rs2/style.css?ver=1.0, Match: 'Version: 0.1'
- [32m[+][0m Enumerating All Plugins
- [32m[+][0m Checking Plugin Versions
- [34m[i][0m Plugin(s) Identified:
- [32m[+][0m gravityforms
- | Location: https://www.rs2.com/wp-content/plugins/gravityforms/
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 2.2.5 (60% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - https://www.rs2.com/wp-content/plugins/gravityforms/css/formreset.min.css?ver=2.2.5
- | - https://www.rs2.com/wp-content/plugins/gravityforms/css/formsmain.min.css?ver=2.2.5
- | - https://www.rs2.com/wp-content/plugins/gravityforms/css/readyclass.min.css?ver=2.2.5
- | - https://www.rs2.com/wp-content/plugins/gravityforms/css/browsers.min.css?ver=2.2.5
- | - https://www.rs2.com/wp-content/plugins/gravityforms/js/jquery.json.min.js?ver=2.2.5
- | - https://www.rs2.com/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.2.5
- [32m[+][0m megamenu
- | Location: https://www.rs2.com/wp-content/plugins/megamenu/
- | Last Updated: 2018-12-17T11:42:00.000Z
- | [33m[!][0m The version is out of date, the latest version is 2.5.3.2
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 2.4 (10% confidence)
- | Detected By: Query Parameter (Passive Detection)
- | - https://www.rs2.com/wp-content/plugins/megamenu/js/maxmegamenu.js?ver=2.4
- [32m[+][0m w3-total-cache
- | Location: https://www.rs2.com/wp-content/plugins/w3-total-cache/
- | Latest Version: 0.9.7.2
- | Last Updated: 2019-01-30T23:42:00.000Z
- |
- | Detected By: Comment Debug Info (Passive Detection)
- |
- | [31m[!][0m 13 vulnerabilities identified:
- |
- | [31m[!][0m Title: W3 Total Cache 0.9.2.4 - Username & Hash Extract
- | Fixed in: 0.9.2.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/6621
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6079
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6078
- | - http://seclists.org/fulldisclosure/2012/Dec/242
- | - https://github.com/FireFart/W3TotalCacheExploit
- |
- | [31m[!][0m Title: W3 Total Cache - Remote Code Execution
- | Fixed in: 0.9.2.9
- | References:
- | - https://wpvulndb.com/vulnerabilities/6622
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2010
- | - https://secunia.com/advisories/53052/
- | - https://www.exploit-db.com/exploits/25137/
- | - http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/
- | - http://wordpress.org/support/topic/pwn3d
- | - http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
- | - https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_total_cache_exec
- |
- | [31m[!][0m Title: W3 Total Cache 0.9.4 - Edge Mode Enabling CSRF
- | Fixed in: 0.9.4.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7621
- | - http://seclists.org/fulldisclosure/2014/Sep/29
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4 - Cross-Site Request Forgery (CSRF)
- | Fixed in: 0.9.4.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7717
- | - http://mazinahmed1.blogspot.com/2014/12/w3-total-caches-w3totalfail.html
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4 - Debug Mode XSS
- | Fixed in: 0.9.4.1
- | References:
- | - https://wpvulndb.com/vulnerabilities/7718
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8724
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 - Authenticated Reflected Cross-Site Scripting (XSS)
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8625
- | - https://blog.zerial.org/seguridad/vulnerabilidad-cross-site-scripting-en-wordpress-w3-total-cache/
- | - http://seclists.org/fulldisclosure/2016/Sep/52
- | - https://sumofpwn.nl/advisory/2016/reflected_cross_site_scripting_vulnerability_in_w3_total_cache_plugin.html
- | - http://seclists.org/fulldisclosure/2016/Nov/63
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 – Unauthenticated Security Token Bypass
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8626
- | - https://secupress.me/blog/4-new-security-flaws-w3-total-cache-0-9-4-1/
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 – Authenticated Arbitrary File Upload
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8627
- | - https://secupress.me/blog/4-new-security-flaws-w3-total-cache-0-9-4-1/
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 – Authenticated Arbitrary File Download
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8628
- | - https://secupress.me/blog/4-new-security-flaws-w3-total-cache-0-9-4-1/
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 – Authenticated Arbitrary PHP Code Execution
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8629
- | - https://secupress.me/blog/4-new-security-flaws-w3-total-cache-0-9-4-1/
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4 - Unauthenticated Server Side Request Forgery (SSRF)
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8644
- | - https://klikki.fi/adv/w3_total_cache.html
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 - Weak Validation of Amazon SNS Push Messages
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8654
- | - https://sumofpwn.nl/advisory/2016/weak_validation_of_amazon_sns_push_messages_in_w3_total_cache_wordpress_plugin.html
- | - http://seclists.org/fulldisclosure/2016/Nov/61
- |
- | [31m[!][0m Title: W3 Total Cache <= 0.9.4.1 - Information Disclosure Race Condition
- | Fixed in: 0.9.5
- | References:
- | - https://wpvulndb.com/vulnerabilities/8655
- | - https://sumofpwn.nl/advisory/2016/information_disclosure_race_condition_in_w3_total_cache_wordpress_plugin.html
- | - http://seclists.org/fulldisclosure/2016/Nov/62
- |
- | The version could not be determined.
- [32m[+][0m wordpress-seo
- | Location: https://www.rs2.com/wp-content/plugins/wordpress-seo/
- | Last Updated: 2019-02-12T11:31:00.000Z
- | [33m[!][0m The version is out of date, the latest version is 9.6
- |
- | Detected By: Comment (Passive Detection)
- |
- | [31m[!][0m 1 vulnerability identified:
- |
- | [31m[!][0m Title: Yoast SEO <= 9.1 - Authenticated Race Condition
- | Fixed in: 9.2
- | References:
- | - https://wpvulndb.com/vulnerabilities/9150
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19370
- | - https://plugins.trac.wordpress.org/changeset/1977260/wordpress-seo
- | - https://www.youtube.com/watch?v=nL141dcDGCY
- | - http://packetstormsecurity.com/files/150497/
- | - https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa
- |
- | Version: 6.3 (60% confidence)
- | Detected By: Comment (Passive Detection)
- | - https://www.rs2.com/, Match: 'optimized with the Yoast SEO plugin v6.3 -'
- [32m[+][0m Enumerating Config Backups
- [34m[i][0m No Config Backups Found.
- [32m[+][0m Finished: Tue Feb 19 10:02:25 2019
- [32m[+][0m Requests Done: 5
- [32m[+][0m Memory used: 78.863 MB
- [32m[+][0m Elapsed time: 00:00:02
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement