WPScan Wordpress Security - Vulnerability Scanning
Permite encontrar vulnerabilidades en los plugins instalados. Para ello WPScan buscará entre los mas de 2220 plugins más populares y nos listará las vulnerabilades encontradas en base a las versiones. Además, y entre otras cosas, es capaz de listarnos los usuarios, versión de WordPress, nombre del theme activo, directorios, la herramienta está programada en Ruby.
Descargamos wpscan:
git clone https://github.com/wpscanteam/wpscan.git cd wpscan bundle install
El uso de WpScan es muy sencillo:
stuxnet@stuxnet:~/Pentesting/wpscan$ ruby wpscan.rb --url localhost.com
WARNING: Nokogiri was built against LibXML version 2.8.0, but has dynamically loaded 2.7.8
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version v2.1r06ab77b
Sponsored by the RandomStorm Open Source Initiative
@_WPScan_, @ethicalhack3r, @erwan_lr, @gbrindisi, @_FireFart_
_______________________________________________________________
| URL: http://localhost.com/
| Started on Fri Oct 4 20:02:30 2013
[+] robots.txt available under 'http://localhost.com/robots.txt'
[!] The WordPress 'http://localhost.com/readme.html' file exists
[!] Full Path Disclosure (FPD) in 'http://localhost.com/wp-includes/rss-functions.php'
[+] Interesting header: SERVER:
[+] Interesting header: X-POWERED-BY: PHP/5.3.24
[+] XML-RPC Interface available under http://localhost.com/xmlrpc.php
[+] WordPress version 3.6 identified from advanced fingerprinting
[!] We have identified 5 vulnerabilities from the version number :
|
| * Title: PHP Object Injection
| * Reference: http://vagosec.org/2013/09/wordpress-php-object-injection/
| * Reference: http://www.openwall.com/lists/oss-security/2013/09/12/1
| * Reference: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4340
| * Reference: http://core.trac.wordpress.org/changeset/25325
| * Reference: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4338
| * Reference: http://secunia.com/advisories/54803
| * Reference: http://osvdb.org/97211
|
| * Title: wp-includes/functions.php get_allowed_mime_types Function SWF / EXE File Upload XSS Weakness
| * Reference: http://core.trac.wordpress.org/changeset/25322
| * Reference: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5739
| * Reference: http://osvdb.org/97210
|
| * Title: Crafted String URL Redirect Restriction Bypass
| * Reference: http://core.trac.wordpress.org/changeset/25323
| * Reference: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4339
| * Reference: http://secunia.com/advisories/54803
| * Reference: http://osvdb.org/97212
|
| * Title: wp-admin/includes/post.php user_ID Parameter Manipulation Post Authorship Spoofing
| * Reference: http://core.trac.wordpress.org/changeset/25321
| * Reference: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4340
| * Reference: http://secunia.com/advisories/54803
| * Reference: http://osvdb.org/97213
|
| * Title: wp-includes/functions.php get_allowed_mime_types Function HTML File Upload XSS Weakness
| * Reference: http://core.trac.wordpress.org/changeset/25322
| * Reference: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5738
| * Reference: http://osvdb.org/97214
[+] The WordPress theme in use is Semantics v1.1
| Name: Semantics v1.1
| Location: http://localhost.com/wp-content/themes/Semantics/
| Readme: http://localhost.com/wp-content/themes/Semantics/readme.txt
| Changelog: http://localhost.com/wp-content/themes/Semantics/changelog.txt
[+] Enumerating plugins from passive detection ...
No plugins found :(
[+] Finished at Fri Oct 4 20:02:40 2013
[+] Elapsed time: 00:00:10
Exiting!
Enumeración de Usuarios con WpScan.
stuxnet@stuxnet:~/Pentesting/wpscan$ ruby wpscan.rb --url localhost.com --enumerate u
WARNING: Nokogiri was built against LibXML version 2.8.0, but has dynamically loaded 2.7.8
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version v2.1r06ab77b
Sponsored by the RandomStorm Open Source Initiative
@_WPScan_, @ethicalhack3r, @erwan_lr, @gbrindisi, @_FireFart_
_______________________________________________________________
| URL: http://localhost.com/
| Started on Fri Oct 4 20:06:17 2013
[+] Enumerating usernames ...
[+] We found the following 2 user/s :
+----+---------+---------+
| Id | Login | Name |
+----+---------+---------+
| 1 | stuxnet | stuxnet |
| 2 | klez | Klez |
+----+---------+---------+
[+] Finished at Fri Oct 4 20:06:29 2013
[+] Elapsed time: 00:00:12
Exiting!
WPScan Wordpress Security - Vulnerability Scanning

Este comentario ha sido eliminado por el autor.
ResponderEliminar