HOME FORUMS MEMBERS RECENT POSTS LOG IN  
× Авторизация
Имя пользователя:
Пароль:
Нет аккаунта? Регистрация
Баннер 1   Баннер 2

ANTICHAT — форум по информационной безопасности, OSINT и технологиям

ANTICHAT — русскоязычное сообщество по безопасности, OSINT и программированию. Форум ранее работал на доменах antichat.ru, antichat.com и antichat.club, и теперь снова доступен на новом адресе — forum.antichat.xyz.
Форум восстановлен и продолжает развитие: доступны архивные темы, добавляются новые обсуждения и материалы.
⚠️ Старые аккаунты восстановить невозможно — необходимо зарегистрироваться заново.
Вернуться   Форум АНТИЧАТ > БЕЗОПАСНОСТЬ И УЯЗВИМОСТИ > Уязвимости > Веб-уязвимости
   
Ответ
 
Опции темы Поиск в этой теме Опции просмотра

  #1  
Старый 03.04.2019, 22:08
InetTester
Новичок
Регистрация: 21.10.2018
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Нашел с помощью wpsscan CVE 2011-4673 (Exploit Title: WordPress jetpack plugin SQL Injection Vulnerability)
мучаюсь уже не один час пытаясь ее использовать.

localhost/wp-content/plugins/jetpack/modules/sharedaddy.php?id=-1
В ответ я ничего не получаю, делаю вывод что скорее всего данный параметр действительно уязвим и wpscan не ошибся.
Но что делать дальше я не совсем понимаю...

Вот описание, и примерэксплуатации который я не совсем понимаю.
WordPress Plugin jetpack - 'sharedaddy.php' ID SQL Injection
 
Ответить с цитированием

  #2  
Старый 03.04.2019, 23:52
Raskolnikov
Новичок
Регистрация: 18.12.2017
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Если в ответ ничего не получаешь, это не значит что параметр уязвим.

wpscan версию-то плагина определил?
 
Ответить с цитированием

  #3  
Старый 04.04.2019, 00:01
InetTester
Новичок
Регистрация: 21.10.2018
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

v3.2.3, данная версия уязвима 100%, вопрос в том как использовать данную инъекцию.

Wpscan:

Код:


Код:
root@debian:~# wpscan --url SITE.COM -e ap
_______________________________________________________________
        __          _______   _____               
        \ \        / /  __ \ / ____|               
         \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
          \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \
           \  /\  /  | |     ____) | (__| (_| | | | |
            \/  \/   |_|    |_____/ \___|\__,_|_| |_|

        WordPress Security Scanner by the WPScan Team
                       Version 2.9.3
          Sponsored by Sucuri - https://sucuri.net
   @_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
_______________________________________________________________

[+] URL: http://SITE.COM/
[+] Started: Fri Apr  5 09:12:25 2019

[!] The WordPress 'http://SITE.COM/readme.html' file exists exposing a version number
[+] Interesting header: LINK: ; rel=shortlink
[+] Interesting header: SERVER: Apache/2.4.25 (Debian)
[+] XML-RPC Interface available under: http://SITE.COM/xmlrpc.php
[!] Upload directory has directory listing enabled: http://SITE.COM/wp-content/uploads/
[!] Includes directory has directory listing enabled: http://SITE.COM/wp-includes/

[+] WordPress version 4.2 (Released on 2015-04-23) identified from advanced fingerprinting, meta generator, readme, links opml, stylesheets numbers
[!] 65 vulnerabilities identified from the version number

[!] Title: WordPress prepare() potential SQL Injection
    Reference: https://wpvulndb.com/vulnerabilities/8905
    Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
    Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
    Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
[i] Fixed in: 4.2.16

[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
    Reference: https://wpvulndb.com/vulnerabilities/8906
    Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
    Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
    Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
    Reference: https://wpvulndb.com/vulnerabilities/8905
[i] Fixed in: 4.7.5

[!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
    Reference: https://wpvulndb.com/vulnerabilities/8910
    Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
    Reference: https://core.trac.wordpress.org/changeset/41398
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
[i] Fixed in: 4.2.16

[!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
    Reference: https://wpvulndb.com/vulnerabilities/8911
    Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
    Reference: https://core.trac.wordpress.org/changeset/41457
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
[i] Fixed in: 4.2.16

[!] Title: WordPress prepare() Weakness
    Reference: https://wpvulndb.com/vulnerabilities/8941
    Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
    Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
    Reference: https://twitter.com/ircmaxell/status/923662170092638208
    Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
[i] Fixed in: 4.2.17

[!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
    Reference: https://wpvulndb.com/vulnerabilities/8966
    Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
    Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
[i] Fixed in: 4.2.18

[!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
    Reference: https://wpvulndb.com/vulnerabilities/8967
    Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
    Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
[i] Fixed in: 4.2.18

[!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
    Reference: https://wpvulndb.com/vulnerabilities/8969
    Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
    Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
[i] Fixed in: 4.2.18

[!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/9006
    Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
    Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
    Reference: https://core.trac.wordpress.org/ticket/42720
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
[i] Fixed in: 4.9.2

[!] Title: WordPress  (79848 / 79848) 100.00% Time: 00:03:17

[+] We found 3 plugins:

[+] Name: all-in-one-seo-pack - v1.3.1
|  Last updated: 2019-02-20T19:20:00.000Z
|  Location: http://SITE.COM/wp-content/plugins/all-in-one-seo-pack/
|  Readme: http://SITE.COM/wp-content/plugins/all-in-one-seo-pack/readme.txt
[!] The version is out of date, the latest version is 2.12
[!] Directory listing is enabled: http://SITE.COM/wp-content/plugins/all-in-one-seo-pack/

[!] Title: All in One SEO Pack <= 2.1.5 - aioseop_functions.php new_meta Parameter XSS
    Reference: https://wpvulndb.com/vulnerabilities/6888
    Reference: http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
[i] Fixed in: 2.1.6

[!] Title: All in One SEO Pack <= 2.1.5 - Unspecified Privilege Escalation
    Reference: https://wpvulndb.com/vulnerabilities/6889
    Reference: http://blog.sucuri.net/2014/05/vulnerability-found-in-the-all-in-one-seo-pack-wordpress-plugin.html
[i] Fixed in: 2.1.6

[!] Title: All in One SEO Pack <= 2.0.3 - XSS
    Reference: https://wpvulndb.com/vulnerabilities/6890
    Reference: http://packetstormsecurity.com/files/123490/
    Reference: http://www.securityfocus.com/bid/62784/
    Reference: http://seclists.org/bugtraq/2013/Oct/8
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5988
    Reference: https://secunia.com/advisories/55133/
[i] Fixed in: 2.0.3.1

[!] Title: All in One SEO Pack <= 2.2.5.1 - Information Disclosure
    Reference: https://wpvulndb.com/vulnerabilities/7881
    Reference: http://jvn.jp/en/jp/JVN75615300/index.html
    Reference: http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0902
[i] Fixed in: 2.2.6

[!] Title: All in One SEO Pack <= 2.2.6.1 - Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/7916
    Reference: https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html
[i] Fixed in: 2.2.6.2

[!] Title: All in One SEO Pack <= 2.3.6.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/8538
    Reference: http://seclists.org/fulldisclosure/2016/Jul/23
    Reference: https://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
    Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_in_all_in_one_seo_pack_wordpress_plugin.html
    Reference: https://wptavern.com/all-in-one-seo-2-3-7-patches-persistent-xss-vulnerability
    Reference: https://www.wordfence.com/blog/2016/07/xss-vulnerability-all-in-one-seo-pack-plugin/
[i] Fixed in: 2.3.7

[!] Title: All in One SEO Pack <= 2.3.7 -  Unauthenticated Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/8558
    Reference: https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
    Reference: https://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
[i] Fixed in: 2.3.8

[!] Title: All in One SEO Pack <= 2.9.1.1 - Authenticated Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/9159
    Reference: https://www.ripstech.com/php-security-calendar-2018/#day-4
    Reference: https://wordpress.org/support/topic/a-critical-vulnerability-has-been-detected-in-this-plugin/
    Reference: https://semperfiwebdesign.com/all-in-one-seo-pack-release-history/
[i] Fixed in: 2.10

[+] Name: jetpack - v3.2.3
|  Last updated: 2019-04-02T18:56:00.000Z
|  Location: http://SITE.COM/wp-content/plugins/jetpack/
|  Readme: http://SITE.COM/wp-content/plugins/jetpack/readme.txt
[!] The version is out of date, the latest version is 7.2
[!] Directory listing is enabled: http://SITE.COM/wp-content/plugins/jetpack/

[!] Title: Jetpack 3.0-3.4.2 - Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/7915
    Reference: https://blog.sucuri.net/2015/04/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html
    Reference: https://jetpack.me/2015/04/20/jetpack-3-4-3-coordinated-security-update/
[i] Fixed in: 3.4.3

[!] Title: Jetpack <= 3.5.2 - Unauthenticated DOM Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/7964
    Reference: https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss-millions-of-wordpress-websites-affected-millions-of-wordpress-websites-affected.html
[i] Fixed in: 3.5.3

[!] Title: Jetpack <= 3.7.0 - Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/8201
    Reference: https://jetpack.me/2015/09/30/jetpack-3-7-1-and-3-7-2-security-and-maintenance-releases/
    Reference: https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-jetpack.html
[i] Fixed in: 3.7.1

[!] Title: Jetpack <= 3.7.0 - Information Disclosure
    Reference: https://wpvulndb.com/vulnerabilities/8202
    Reference: https://jetpack.me/2015/09/30/jetpack-3-7-1-and-3-7-2-security-and-maintenance-releases/
[i] Fixed in: 3.7.1

[!] Title: Jetpack <= 3.9.1 - LaTeX HTML Element XSS
    Reference: https://wpvulndb.com/vulnerabilities/8472
    Reference: https://jetpack.com/2016/02/25/jetpack-3-9-2-maintenance-and-security-release/
    Reference: https://github.com/Automattic/jetpack/commit/dbc33b9105c4dbb0de81544e682a8b6d5ab7e446
[i] Fixed in: 3.9.2

[!] Title: Jetpack 2.0-4.0.2 - Shortcode Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/8500
    Reference: https://jetpack.com/2016/05/27/jetpack-4-0-3-critical-security-update/
    Reference: http://wptavern.com/jetpack-4-0-3-patches-a-critical-xss-vulnerability
    Reference: https://blog.sucuri.net/2016/05/security-advisory-stored-xss-jetpack-2.html
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10706
[i] Fixed in: 4.0.3

[!] Title: Jetpack <= 4.0.3 - Multiple Vulnerabilities
    Reference: https://wpvulndb.com/vulnerabilities/8517
    Reference: https://jetpack.com/2016/06/20/jetpack-4-0-4-bug-fixes/
    Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10705
[i] Fixed in: 4.0.4

[!] Title: Jetpack <= 6.4.2 - Authenticated Stored Cross-Site Scripting (XSS)
    Reference: https://wpvulndb.com/vulnerabilities/9168
    Reference: https://www.ripstech.com/php-security-calendar-2018/#day-11
[i] Fixed in: 6.5

[+] Name: wp-serverinfo - v1.30
|  Last updated: 2018-12-19T06:22:00.000Z
|  Location: http://SITE.COM/wp-content/plugins/wp-serverinfo/
|  Readme: http://SITE.COM/wp-content/plugins/wp-serverinfo/readme.txt
[!] The version is out of date, the latest version is 1.65
[!] Directory listing is enabled: http://SITE.COM/wp-content/plugins/wp-serverinfo/

[+] Finished: Fri Apr  5 09:15:58 2019
[+] Requests Done: 79906
[+] Memory used: 181.289 MB
[+] Elapsed time: 00:03:33
 
Ответить с цитированием

  #4  
Старый 05.04.2019, 21:00
MrBa
Новичок
Регистрация: 10.01.2017
Сообщений: 11
Провел на форуме:
3505

Репутация: 0
По умолчанию

Код:
http://nonaname.com/sharedaddy.php?id=1'
так не пробовали?
 
Ответить с цитированием

  #5  
Старый 06.04.2019, 20:50
Raskolnikov
Новичок
Регистрация: 18.12.2017
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Версия 3.2.3 была выпущена в 2016 году, а сплойт 2011, не уязвима это версия к sql inj

Код:


Код:
== Changelog ==
= 3.2.3 =
Release Date: May 26, 2016
Судя по по чэйнджлогу, поледняя уязвимая версия 1.2.1 либо 1.2.2
 
Ответить с цитированием

  #6  
Старый 07.04.2019, 02:49
InetTester
Новичок
Регистрация: 21.10.2018
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Да, все верно, плагин бесполезный(был невнимателен).

Доп инфа(сразу забыл)
1. apache:http_server: 2.4.25 CVE-2017-9798
вроде позволяет произвести атаку 'memory leak' если верно понимаю требуется присутствие на сервере авторизованных пользователей(вся суть в обработке сервером метода OPTIONS в test_bleed() что в результате мне позволит получить загруженные ими данные в RАМ, либо просто приведет к отказу в обслуживании(DOS).

Нахожу нужный мне эксплойт
Apache prepare() potential SQL Injection

Reference: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection

Reference: WordPress 4.8.2 Security and Maintenance Release

Reference: Database: Hardening for `wpdb:repare()` · WordPress/WordPress@70b2127

Reference: Database: Hardening to bring `wpdb:repare()` inline with documentat… · WordPress/WordPress@fc930d3

Fixed in: 4.2.16

[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection

Reference: WordPress 2.3.0-4.7.4 - Authenticated SQL injection

Reference: Wordpress SQLi

Reference: WordPress 4.8.2 Security and Maintenance Release

Reference: Database: Hardening for `wpdb:repare()` · WordPress/WordPress@70b2127

Reference: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection

Fixed in: 4.7.5

[!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection

Reference: WordPress 3.5-4.7.1 - WP_Query SQL Injection

Reference: WordPress 4.7.2 Security Release

Reference: Query: Ensure that queries work correctly with post type names with s… · WordPress/WordPress@8538429

Reference: CVE - CVE-2017-5611

Fixed in: 4.2.12
[/I]
 
Ответить с цитированием

  #7  
Старый 07.04.2019, 12:27
Raskolnikov
Новичок
Регистрация: 18.12.2017
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Цитата:

InetTester сказал(а):

[!] Title: WordPress prepare() potential SQL Injection
Reference: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
Reference: WordPress 4.8.2 Security and Maintenance Release
Reference: Database: Hardening for `wpdb:repare()` · WordPress/WordPress@70b2127
Reference: Database: Hardening to bring `wpdb:repare()` inline with documentat… · WordPress/WordPress@fc930d3
Fixed in: 4.2.16
Здесь потенциальная инъекция, эксплуатация требует наличие уязвимых плагинов, 0day нужно искать в плагинах самостоятельно

Цитата:

InetTester сказал(а):

[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
Reference: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
Reference: Wordpress SQLi
Reference: WordPress 4.8.2 Security and Maintenance Release
Reference: Database: Hardening for `wpdb:repare()` · WordPress/WordPress@70b2127
Reference: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
Fixed in: 4.7.5
Снова наличие уязвимых плагинов/тем

Цитата:

InetTester сказал(а):

[!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
Reference: WordPress 3.5-4.7.1 - WP_Query SQL Injection
Reference: WordPress 4.7.2 Security Release
Reference: Query: Ensure that queries work correctly with post type names with s… · WordPress/WordPress@8538429
Reference: CVE - CVE-2017-5611
Fixed in: 4.2.12
Аналогичная ситуация с плагинами/темами

Я бы на твоём месте посмотрел бы в сторону этого:

Цитата:

[!] Title: All in One SEO Pack <= 2.3.6.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
Reference: All in One SEO Pack <= 2.3.6.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
Reference: Full Disclosure: Persistent Cross-Site Scripting in All in One SEO Pack WordPress Plugin
Reference: All in One SEO Pack Changelog | WordPress Developer
Reference: Summer of Pwnage! July 1-29, Amsterdam.
Reference: All in One SEO 2.3.7 Patches Persistent XSS Vulnerability
Reference: Serious Vulnerability in All in One SEO Pack Plugin 2.3.6.1 and earlier
Fixed in: 2.3.7
 
Ответить с цитированием

  #8  
Старый 07.04.2019, 14:34
InetTester
Новичок
Регистрация: 21.10.2018
Сообщений: 0
Провел на форуме:
0

Репутация: 0
По умолчанию

Цитата:

Raskolnikov сказал(а):

Здесь доступ к бд нужен

Я бы на твоём месте посмотрел бы в сторону этого:

XSS, не подходят...
 
Ответить с цитированием
Ответ





Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
 


Быстрый переход




ANTICHAT ™ © 2001- Antichat Kft.