⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_wordpress_mult_vuln_900219.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  WordPress Multiple Vulnerabilities - Sept08##  Copyright: SecPod##  Date Written: 2008/10/12##  Revision: 1.1##  Log: veerendragg#  Issue #0192#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------##############################################################################if(description){ script_id(900219); script_bugtraq_id(30750, 31068, 31115); script_cve_id("CVE-2008-3747"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses"); script_name(english:"WordPress Multiple Vulnerabilities"); script_summary(english:"Check for version of WordPress"); desc["english"] = " Overview : This host is running WordPress, which is prone to multiple vulnerabilities. Vulnerability Insight :        The flaws are due to,                - SQL column-truncation issue.		- Weakness in the entropy of generated passwords.		- functions get_edit_post_link(), and get_edit_comment_link() fail                  to use SSL when transmitting data.        Impact : Successful exploitation will allow attackers to reset the        password of arbitrary accounts, guess randomly generated passwords,        obtain sensitive information and possibly to impersonate users and        tamper with network data. Impact Level : Application Affected Software/OS :        WordPress 2.6.1 and prior versions. Fix : Upgrade to WordPress 2.6.2 or later. http://wordpress.org/ References : http://www.sektioneins.de/advisories/SE-2008-05.txt http://seclists.org/fulldisclosure/2008/Sep/0194.html http://www.juniper.net/security/auto/vulnerabilities/vuln31068.html http://www.juniper.net/security/auto/vulnerabilities/vuln30750.html CVSS Score :        CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)        CVSS Temporal Score : 5.3 Risk factor : High"; script_description(english:desc["english"]); script_dependencies("http_version.nasl"); script_require_ports("Services/www", 80); exit(0);} include("http_func.inc"); include("http_keepalive.inc"); port = get_http_port(default:80); if(!port){        exit(0); } foreach path (make_list("/wordpress", cgi_dirs())) {        sndReq = http_get(item:string(path, "/index.php"), port:port);        rcvRes = http_keepalive_send_recv(port:port, data:sndReq);        if(rcvRes == NULL){                exit(0);        }	if(egrep(pattern:"Powered by WordPress", string:rcvRes) &&           egrep(pattern:"^HTTP/.* 200 OK", string:rcvRes))        {                if(egrep(pattern:"WordPress 2\.([0-5](\..*)?|6(\.[01])?)[^.0-9]",                         string:rcvRes)){                        security_hole(port);                }                exit(0);        } }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -