secpod_wordpress_mult_vuln_900219.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 107 行
NASL
107 行
################################################################################ WordPress Multiple Vulnerabilities - Sept08## Copyright: SecPod## Date Written: 2008/10/12## Revision: 1.1## Log: veerendragg# Issue #0192# ------------------------------------------------------------------------# This program was written by SecPod and is licensed under the GNU GPL # license. Please refer to the below link for details,# http://www.gnu.org/licenses/gpl.html# This header contains information regarding licensing terms under the GPL, # and information regarding obtaining source code from the Author. # Consequently, pursuant to section 3(c) of the GPL, you must accompany the # information found in this header with any distribution you make of this # Program.# ------------------------------------------------------------------------##############################################################################if(description){ script_id(900219); script_bugtraq_id(30750, 31068, 31115); script_cve_id("CVE-2008-3747"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses"); script_name(english:"WordPress Multiple Vulnerabilities"); script_summary(english:"Check for version of WordPress"); desc["english"] = " Overview : This host is running WordPress, which is prone to multiple vulnerabilities. Vulnerability Insight : The flaws are due to, - SQL column-truncation issue. - Weakness in the entropy of generated passwords. - functions get_edit_post_link(), and get_edit_comment_link() fail to use SSL when transmitting data. Impact : Successful exploitation will allow attackers to reset the password of arbitrary accounts, guess randomly generated passwords, obtain sensitive information and possibly to impersonate users and tamper with network data. Impact Level : Application Affected Software/OS : WordPress 2.6.1 and prior versions. Fix : Upgrade to WordPress 2.6.2 or later. http://wordpress.org/ References : http://www.sektioneins.de/advisories/SE-2008-05.txt http://seclists.org/fulldisclosure/2008/Sep/0194.html http://www.juniper.net/security/auto/vulnerabilities/vuln31068.html http://www.juniper.net/security/auto/vulnerabilities/vuln30750.html CVSS Score : CVSS Base Score : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P) CVSS Temporal Score : 5.3 Risk factor : High"; script_description(english:desc["english"]); script_dependencies("http_version.nasl"); script_require_ports("Services/www", 80); exit(0);} include("http_func.inc"); include("http_keepalive.inc"); port = get_http_port(default:80); if(!port){ exit(0); } foreach path (make_list("/wordpress", cgi_dirs())) { sndReq = http_get(item:string(path, "/index.php"), port:port); rcvRes = http_keepalive_send_recv(port:port, data:sndReq); if(rcvRes == NULL){ exit(0); } if(egrep(pattern:"Powered by WordPress", string:rcvRes) && egrep(pattern:"^HTTP/.* 200 OK", string:rcvRes)) { if(egrep(pattern:"WordPress 2\.([0-5](\..*)?|6(\.[01])?)[^.0-9]", string:rcvRes)){ security_hole(port); } exit(0); } }
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?