Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ wpscan --url https://lapinblanc.me
- _______________________________________________________________
- __ _______ _____
- \ \ / / __ \ / ____|
- \ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
- \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
- \ /\ / | | ____) | (__| (_| | | | |
- \/ \/ |_| |_____/ \___|\__,_|_| |_|
- WordPress Security Scanner by the WPScan Team
- Version 3.8.21
- @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
- _______________________________________________________________
- [i] Upersonne bien eduquéeating the Database ...
- [i] Upersonne bien eduquéeate completed.
- [+] URL: https://lapinblanc.me/ [87.98.154.146]
- [+] Started: Sun Mar 20 09:46:50 2022
- Interesting Finding(s):
- [+] Headers
- | Interesting Entries:
- | - server: Apache
- | - x-powered-by: PHP/7.0
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] robots.txt found: https://lapinblanc.me/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] XML-RPC seems to be enabled: https://lapinblanc.me/xmlrpc.php
- | Found By: Link Tag (Passive Detection)
- | Confidence: 100%
- | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/
- [+] WordPress readme found: https://lapinblanc.me/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] Upload directory has listing enabled: https://lapinblanc.me/wp-content/uploads/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] The external WP-Cron seems to be enabled: https://lapinblanc.me/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 4.9.3 identified (Insecure, released on 2018-02-05).
- | Found By: Rss Generator (Passive Detection)
- | - https://lapinblanc.me/feed/, <generator>https://wordpress.org/?v=4.9.3</generator>
- | - https://lapinblanc.me/comments/feed/, <generator>https://wordpress.org/?v=4.9.3</generator>
- |
- | [!] 38 vulnerabilities identified:
- |
- | [!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
- | References:
- | - https://wpscan.com/vulnerability/5e0c1ddd-fdd0-421b-bdbe-3eee6b75c919
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
- | - https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
- | - https://github.com/quitten/doser.py
- | - https://thehackernews.com/2018/02/wordpress-dos-exploit.html
- |
- | [!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
- | Fixed in: 4.9.5
- | References:
- | - https://wpscan.com/vulnerability/835614a2-ad92-4027-b485-24b39038171d
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
- |
- | [!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
- | Fixed in: 4.9.5
- | References:
- | - https://wpscan.com/vulnerability/01b587e0-0a86-47af-a088-6e5e350e8247
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
- |
- | [!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
- | Fixed in: 4.9.5
- | References:
- | - https://wpscan.com/vulnerability/2b7c77c3-8dbc-4a2a-9ea3-9929c3373557
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
- | - https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
- |
- | [!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
- | Fixed in: 4.9.7
- | References:
- | - https://wpscan.com/vulnerability/42ab2bd9-bbb1-4f25-a632-1811c5130bb4
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
- | - https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
- | - http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
- | - https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
- | - https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
- | - https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated File Delete
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/e3ef8976-11cb-4854-837f-786f43cbdf44
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20147
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Post Type Bypass
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/999dba5a-82fb-4717-89c3-6ed723cc7e45
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20152
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
- |
- | [!] Title: WordPress <= 5.0 - PHP Object Injection via Meta Data
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/046ff6a0-90b2-4251-98fc-b7fba93f8334
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20148
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Authenticated Cross-Site Scripting (XSS)
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/3182002e-d831-4412-a27d-a5e39bb44314
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20153
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - Cross-Site Scripting (XSS) that could affect plugins
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/7f7a0795-4dd7-417d-804e-54f12595d1e4
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20150
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/fb3c6ea0618fcb9a51d4f2c1940e9efcd4a2d460
- |
- | [!] Title: WordPress <= 5.0 - User Activation Screen Search Engine Indexing
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/65f1aec4-6d28-4396-88d7-66702b21c7a2
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20151
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- |
- | [!] Title: WordPress <= 5.0 - File Upload to XSS on Apache Web Servers
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/d741f5ae-52ca-417d-a2ca-acdfb7ca5808
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20149
- | - https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
- | - https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
- |
- | [!] Title: WordPress 3.7-5.0 (except 4.9.9) - Authenticated Code Execution
- | Fixed in: 4.9.9
- | References:
- | - https://wpscan.com/vulnerability/1a693e57-f99c-4df6-93dd-0cdc92fd0526
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8943
- | - https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
- | - https://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce
- |
- | [!] Title: WordPress 3.9-5.1 - Comment Cross-Site Scripting (XSS)
- | Fixed in: 4.9.10
- | References:
- | - https://wpscan.com/vulnerability/d150f43f-6030-4191-98b8-20ae05585936
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9787
- | - https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
- | - https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
- | - https://blog.ripstech.com/2019/wordpress-csrf-to-rce/
- |
- | [!] Title: WordPress <= 5.2.2 - Cross-Site Scripting (XSS) in URL Sanitisation
- | Fixed in: 4.9.11
- | References:
- | - https://wpscan.com/vulnerability/4494a903-5a73-4cad-8c14-1e7b4da2be61
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16222
- | - https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
- | - https://github.com/WordPress/WordPress/commit/30ac67579559fe42251b5a9f887211bf61a8ed68
- | - https://hackerone.com/reports/339483
- |
- | [!] Title: WordPress <= 5.2.3 - Stored XSS in Customizer
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/d39a7b84-28b9-4916-a2fc-6192ceb6fa56
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17674
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- |
- | [!] Title: WordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/3413b879-785f-4c9f-aa8a-5a4a1d5e0ba2
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17671
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- | - https://github.com/WordPress/WordPress/commit/f82ed753cf00329a5e41f2cb6dc521085136f308
- | - https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
- |
- | [!] Title: WordPress <= 5.2.3 - Stored XSS in Style Tags
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/d005b1f8-749d-438a-8818-21fba45c6465
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17672
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- |
- | [!] Title: WordPress <= 5.2.3 - JSON Request Cache Poisoning
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/7804d8ed-457a-407e-83a7-345d3bbe07b2
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17673
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- |
- | [!] Title: WordPress <= 5.2.3 - Server-Side Request Forgery (SSRF) in URL Validation
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/26a26de2-d598-405d-b00c-61f71cfacff6
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17669
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17670
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://github.com/WordPress/WordPress/commit/9db44754b9e4044690a6c32fd74b9d5fe26b07b2
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- |
- | [!] Title: WordPress <= 5.2.3 - Admin Referrer Validation
- | Fixed in: 4.9.12
- | References:
- | - https://wpscan.com/vulnerability/715c00e3-5302-44ad-b914-131c162c3f71
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17675
- | - https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- | - https://github.com/WordPress/WordPress/commit/b183fd1cca0b44a92f0264823dd9f22d2fd8b8d0
- | - https://blog.wpscan.com/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- |
- | [!] Title: WordPress <= 5.3 - Authenticated Improper Access Controls in REST API
- | Fixed in: 4.9.13
- | References:
- | - https://wpscan.com/vulnerability/4a6de154-5fbd-4c80-acd3-8902ee431bd8
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20043
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16788
- | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-g7rg-hchx-c2gw
- |
- | [!] Title: WordPress <= 5.3 - Authenticated Stored XSS via Crafted Links
- | Fixed in: 4.9.13
- | References:
- | - https://wpscan.com/vulnerability/23553517-34e3-40a9-a406-f3ffbe9dd265
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20042
- | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
- | - https://hackerone.com/reports/509930
- | - https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7
- |
- | [!] Title: WordPress <= 5.3 - Authenticated Stored XSS via Block Editor Content
- | Fixed in: 4.9.13
- | References:
- | - https://wpscan.com/vulnerability/be794159-4486-4ae1-a5cc-5c190e5ddf5f
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16781
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16780
- | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pg4x-64rh-3c9v
- |
- | [!] Title: WordPress <= 5.3 - wp_kses_bad_protocol() Colon Bypass
- | Fixed in: 4.9.13
- | References:
- | - https://wpscan.com/vulnerability/8fac612b-95d2-477a-a7d6-e5ec0bb9ca52
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20041
- | - https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
- | - https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53
- |
- | [!] Title: WordPress < 5.4.1 - Password Reset Tokens Failed to Be Properly Invalidated
- | Fixed in: 4.9.14
- | References:
- | - https://wpscan.com/vulnerability/7db191c0-d112-4f08-a419-a1cd81928c4e
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
- | - https://wordpress.org/news/2020/04/wordpress-5-4-1/
- | - https://core.trac.wordpress.org/changeset/47634/
- | - https://www.wordfence.com/blog/2020/04/unpacking-the-7-vulnerabilities-fixed-in-todays-wordpress-5-4-1-security-upersonne bien eduquéeate/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-ww7v-jg8c-q6jw
- |
- | [!] Title: WordPress < 5.4.1 - Unauthenticated Users View Private Posts
- | Fixed in: 4.9.14
- | References:
- | - https://wpscan.com/vulnerability/d1e1ba25-98c9-4ae7-8027-9632fb825a56
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
- | - https://wordpress.org/news/2020/04/wordpress-5-4-1/
- | - https://core.trac.wordpress.org/changeset/47635/
- | - https://www.wordfence.com/blog/2020/04/unpacking-the-7-vulnerabilities-fixed-in-todays-wordpress-5-4-1-security-upersonne bien eduquéeate/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xhx9-759f-6p2w
- |
- | [!] Title: WordPress < 5.4.1 - Authenticated Cross-Site Scripting (XSS) in Customizer
- | Fixed in: 4.9.14
- | References:
- | - https://wpscan.com/vulnerability/4eee26bd-a27e-4509-a3a5-8019dd48e429
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
- | - https://wordpress.org/news/2020/04/wordpress-5-4-1/
- | - https://core.trac.wordpress.org/changeset/47633/
- | - https://www.wordfence.com/blog/2020/04/unpacking-the-7-vulnerabilities-fixed-in-todays-wordpress-5-4-1-security-upersonne bien eduquéeate/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-4mhg-j6fx-5g3c
- |
- | [!] Title: WordPress < 5.4.1 - Cross-Site Scripting (XSS) in wp-object-cache
- | Fixed in: 4.9.14
- | References:
- | - https://wpscan.com/vulnerability/e721d8b9-a38f-44ac-8520-b4a9ed6a5157
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
- | - https://wordpress.org/news/2020/04/wordpress-5-4-1/
- | - https://core.trac.wordpress.org/changeset/47637/
- | - https://www.wordfence.com/blog/2020/04/unpacking-the-7-vulnerabilities-fixed-in-todays-wordpress-5-4-1-security-upersonne bien eduquéeate/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-568w-8m88-8g2c
- |
- | [!] Title: WordPress < 5.4.1 - Authenticated Cross-Site Scripting (XSS) in File Uploads
- | Fixed in: 4.9.14
- | References:
- | - https://wpscan.com/vulnerability/55438b63-5fc9-4812-afc4-2f1eff800d5f
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
- | - https://wordpress.org/news/2020/04/wordpress-5-4-1/
- | - https://core.trac.wordpress.org/changeset/47638/
- | - https://www.wordfence.com/blog/2020/04/unpacking-the-7-vulnerabilities-fixed-in-todays-wordpress-5-4-1-security-upersonne bien eduquéeate/
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-3gw2-4656-pfr2
- | - https://hackerone.com/reports/179695
- |
- | [!] Title: WordPress 4.7-5.7 - Authenticated Password Protected Pages Exposure
- | Fixed in: 4.9.17
- | References:
- | - https://wpscan.com/vulnerability/6a3ec618-c79e-4b9c-9020-86b157458ac5
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450
- | - https://wordpress.org/news/2021/04/wordpress-5-7-1-security-and-maintenance-release/
- | - https://blog.wpscan.com/2021/04/15/wordpress-571-security-vulnerability-release.html
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pmmh-2f36-wvhq
- | - https://core.trac.wordpress.org/changeset/50717/
- | - https://www.youtube.com/watch?v=J2GXmxAdNWs
- |
- | [!] Title: WordPress 3.7 to 5.7.1 - Object Injection in PHPMailer
- | Fixed in: 4.9.18
- | References:
- | - https://wpscan.com/vulnerability/4cd46653-4470-40ff-8aac-318bee2f998d
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36326
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19296
- | - https://github.com/WordPress/WordPress/commit/267061c9595fedd321582d14c21ec9e7da2dcf62
- | - https://wordpress.org/news/2021/05/wordpress-5-7-2-security-release/
- | - https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9
- | - https://www.wordfence.com/blog/2021/05/wordpress-5-7-2-security-release-what-you-need-to-know/
- | - https://www.youtube.com/watch?v=HaW15aMzBUM
- |
- | [!] Title: WordPress < 5.8 - Plugin Confusion
- | Fixed in: 5.8
- | References:
- | - https://wpscan.com/vulnerability/95e01006-84e4-4e95-b5d7-68ea7b5aa1a8
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44223
- | - https://vavkamil.cz/2021/11/25/wordpress-plugin-confusion-upersonne bien eduquéeate-can-get-you-pwned/
- |
- | [!] Title: WordPress < 5.8.3 - SQL Injection via WP_Query
- | Fixed in: 4.9.19
- | References:
- | - https://wpscan.com/vulnerability/7f768bcf-ed33-4b22-b432-d1e7f95c1317
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21661
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-6676-cqfm-gw84
- | - https://hackerone.com/reports/1378209
- |
- | [!] Title: WordPress < 5.8.3 - Author+ Stored XSS via Post Slugs
- | Fixed in: 4.9.19
- | References:
- | - https://wpscan.com/vulnerability/dc6f04c2-7bf2-4a07-92b5-dd197e4d94c8
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w
- | - https://hackerone.com/reports/425342
- | - https://blog.sonarsource.com/wordpress-stored-xss-vulnerability
- |
- | [!] Title: WordPress 4.1-5.8.2 - SQL Injection via WP_Meta_Query
- | Fixed in: 4.9.19
- | References:
- | - https://wpscan.com/vulnerability/24462ac4-7959-4575-97aa-a6dcceeae722
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21664
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jp3p-gw8h-6x86
- |
- | [!] Title: WordPress < 5.8.3 - Super Admin Object Injection in Multisites
- | Fixed in: 4.9.19
- | References:
- | - https://wpscan.com/vulnerability/008c21ab-3d7e-4d97-b6c3-db9d83f390a7
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21663
- | - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8p8-332h
- | - https://hackerone.com/reports/541469
- |
- | [!] Title: WordPress < 5.9.2 - Prototype Pollution in jQuery
- | Fixed in: 4.9.20
- | References:
- | - https://wpscan.com/vulnerability/1ac912c1-5e29-41ac-8f76-a062de254c09
- | - https://wordpress.org/news/2022/03/wordpress-5-9-2-security-maintenance-release/
- [+] WordPress theme in use: motive
- | Location: https://lapinblanc.me/wp-content/themes/motive/
- | Readme: https://lapinblanc.me/wp-content/themes/motive/readme.txt
- | Style URL: https://lapinblanc.me/wp-content/themes/motive/style.css?ver=4.9.3
- | Style Name: Motive
- | Style URI: https://themeforest.net/user/themeple/portfolio
- | Description: Motive is a multi-niche WordPress theme. Themeple Themes are simple and powerful. Create awesome por...
- | Author: Themeple
- | Author URI: http://www.themeple.co
- |
- | Found By: Css Style In Homepage (Passive Detection)
- | Confirmed By: Css Style In 404 Page (Passive Detection)
- |
- | Version: 1.0.5 (80% confidence)
- | Found By: Style (Passive Detection)
- | - https://lapinblanc.me/wp-content/themes/motive/style.css?ver=4.9.3, Match: 'Version: 1.0.5'
- [+] Enumerating All Plugins (via Passive Methods)
- [+] Checking Plugin Versions (via Passive and Aggressive Methods)
- [i] Plugin(s) Identified:
- [+] add-to-any
- | Location: https://lapinblanc.me/wp-content/plugins/add-to-any/
- | Last Upersonne bien eduquéeated: 2022-01-24T22:20:00.000Z
- | [!] The version is out of date, the latest version is 1.8.4
- |
- | Found By: Urls In Homepage (Passive Detection)
- | Confirmed By: Urls In 404 Page (Passive Detection)
- |
- | [!] 2 vulnerabilities identified:
- |
- | [!] Title: AddToAny < 1.7.46 - Authenticated Stored XSS
- | Fixed in: 1.7.46
- | References:
- | - https://wpscan.com/vulnerability/cf7c0207-adb2-44c6-9469-2b24dbfec83a
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24568
- |
- | [!] Title: AddToAny Share Buttons < 1.7.48 - Admin+ Stored Cross-Site Scripting
- | Fixed in: 1.7.48
- | References:
- | - https://wpscan.com/vulnerability/04eaf380-c345-425f-8800-142e3f4745a9
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24616
- | - https://plugins.trac.wordpress.org/changeset/2609928/
- |
- | Version: 1.7.25 (100% confidence)
- | Found By: Readme - Stable Tag (Aggressive Detection)
- | - https://lapinblanc.me/wp-content/plugins/add-to-any/README.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - https://lapinblanc.me/wp-content/plugins/add-to-any/README.txt
- [+] js_composer
- | Location: https://lapinblanc.me/wp-content/plugins/js_composer/
- | Last Upersonne bien eduquéeated: 2021-12-21T05:29:28.000Z
- | [!] The version is out of date, the latest version is 6.8.0
- |
- | Found By: Urls In Homepage (Passive Detection)
- | Confirmed By: Body Tag (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: WPBakery Page Builder < 6.4.1 - Authenticated Stored Cross-Site Scripting (XSS)
- | Fixed in: 6.4.1
- | References:
- | - https://wpscan.com/vulnerability/11285589-1b22-4ec0-adfc-f2add70db4d7
- | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28650
- | - https://www.wordfence.com/blog/2020/10/vulnerability-exposes-over-4-million-sites-using-wpbakery/
- |
- | Version: 5.3 (80% confidence)
- | Found By: Body Tag (Passive Detection)
- | - https://lapinblanc.me/, Match: 'js-comp-ver-5.3'
- | Confirmed By: Query Parameter (Passive Detection)
- | - https://lapinblanc.me/wp-content/plugins/js_composer/assets/css/js_composer.min.css?ver=5.3
- | - https://lapinblanc.me/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=5.3
- [+] LayerSlider
- | Location: https://lapinblanc.me/wp-content/plugins/LayerSlider/
- |
- | Found By: Urls In Homepage (Passive Detection)
- | Confirmed By:
- | Urls In 404 Page (Passive Detection)
- | Meta Generator (Passive Detection)
- |
- | [!] 1 vulnerability identified:
- |
- | [!] Title: LayerSlider <= 6.2.0 - CSRF / Authenticated Stored XSS & SQL Injection
- | Fixed in: 6.2.1
- | References:
- | - https://wpscan.com/vulnerability/9e426e65-7373-4934-89c3-42d5c1152a74
- | - http://wphutte.com/layer-slider-6-1-6-csrf-to-xss-to-sqli-with-poc/
- | - https://support.kreaturamedia.com/docs/layersliderwp/documentation.html#release-log
- |
- | Version: 6.0.6 (90% confidence)
- | Found By: Query Parameter (Passive Detection)
- | - https://lapinblanc.me/wp-content/plugins/LayerSlider/static/layerslider/css/layerslider.css?ver=6.0.6
- | - https://lapinblanc.me/wp-content/plugins/LayerSlider/static/layerslider/js/layerslider.kreaturamedia.jquery.js?ver=6.0.6
- | - https://lapinblanc.me/wp-content/plugins/LayerSlider/static/layerslider/js/layerslider.transitions.js?ver=6.0.6
- | Confirmed By: Meta Generator (Passive Detection)
- | - https://lapinblanc.me/, Match: 'Powered by LayerSlider 6.0.6 -'
- [+] revslider
- | Location: https://lapinblanc.me/wp-content/plugins/revslider/
- | Last Upersonne bien eduquéeated: 2022-03-14T08:26:41.000Z
- | [!] The version is out of date, the latest version is 6.5.19
- |
- | Found By: Urls In Homepage (Passive Detection)
- | Confirmed By:
- | Urls In 404 Page (Passive Detection)
- | Comment (Passive Detection)
- | Div Data Version (Passive Detection)
- | Meta Generator (Passive Detection)
- |
- | Version: 5.4.6 (100% confidence)
- | Found By: Comment (Passive Detection)
- | - https://lapinblanc.me/, Match: 'START REVOLUTION SLIDER 5.4.6'
- | Confirmed By: Div Data Version (Passive Detection)
- | - https://lapinblanc.me/, Match: '5.4.6'
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:00:05 <==============================================================================================================> (137 / 137) 100.00% Time: 00:00:05
- [i] No Config Backups Found.
- [+] WPScan DB API OK
- | Plan: free
- | Requests Done (during the scan): 6
- | Requests Remaining: 19
- [+] Finished: Sun Mar 20 09:47:04 2022
- [+] Requests Done: 209
- [+] Cached Requests: 7
- [+] Data Sent: 56.956 KB
- [+] Data Received: 19.103 MB
- [+] Memory used: 247.531 MB
- [+] Elapsed time: 00:00:14
Advertisement
Add Comment
Please, Sign In to add comment