WPSeku – WordPress漏洞扫描工具
作者:admin | 时间:2018-8-4 20:30:17 | 分类:黑客工具 隐藏侧边栏展开侧边栏
说到wordpress漏洞扫描就不得不提wpscan,他们维护了一个针对wp的漏洞库,是一个十分强大的扫描器,该工具与其相似,但是又有一个强大的漏洞,就是可以针对本地的wp插件的php代码静态扫描
Installation
$ git clone https://github.com/m4ll0k/WPSeku.git wpseku $ cd wpseku $ pip3 install -r requirements.txt $ python3 wpseku.py Usage Generic Scan
python3 wpseku.py --url https://www.xxxxxxx.com --verbose
-
Output
---------------------------------------- _ _ _ ___ ___ ___| |_ _ _ | | | | . |_ -| -_| '_| | | |_____| _|___|___|_,_|___| |_| v0.4.0 WPSeku - WordPress Security Scanner by Momo Outaadi (m4ll0k) ---------------------------------------- [ + ] Target: https://www.xxxxxxx.com [ + ] Starting: 02:38:51 [ + ] Server: Apache [ + ] Uncommon header "X-Pingback" found, with contents: https://www.xxxxxxx.com/xmlrpc.php [ i ] Checking Full Path Disclosure... [ + ] Full Path Disclosure: /home/ehc/public_html/wp-includes/rss-functions.php [ i ] Checking wp-config backup file... [ + ] wp-config.php available at: https://www.xxxxxxx.com/wp-config.php [ i ] Checking common files... [ + ] robots.txt file was found at: https://www.xxxxxxx.com/robots.txt [ + ] xmlrpc.php file was found at: https://www.xxxxxxx.com/xmlrpc.php [ + ] readme.html file was found at: https://www.xxxxxxx.com/readme.html [ i ] Checking directory listing... [ + ] Dir "/wp-admin/css" listing enable at: https://www.xxxxxxx.com/wp-admin/css/ [ + ] Dir "/wp-admin/images" listing enable at: https://www.xxxxxxx.com/wp-admin/images/ [ + ] Dir "/wp-admin/includes" listing enable at: https://www.xxxxxxx.com/wp-admin/includes/ [ + ] Dir "/wp-admin/js" listing enable at: https://www.xxxxxxx.com/wp-admin/js/ ......
Bruteforce Login
python3 wpseku.py --url https://www.xxxxxxx.com --brute --user test --wordlist wl.txt --verbose
Scan plugin,theme and wordpress code
python3 wpseku.py --scan <dir/file> --verbose
Note: Testing Akismet Directory Plugin https://plugins.svn.wordpress.org/akismet
-
Output
---------------------------------------- _ _ _ ___ ___ ___| |_ _ _ | | | | . |_ -| -_| '_| | | |_____| _|___|___|_,_|___| |_| v0.4.0 WPSeku - WordPress Security Scanner by Momo Outaadi (m4ll0k) ---------------------------------------- [ + ] Checking PHP code... [ + ] Scanning directory... [ i ] Scanning trunk/class.akismet.php file ---------------------------------------------------------------------------------------------------------- | Line | Possibile Vuln. | String | ---------------------------------------------------------------------------------------------------------- | 597 | Cross-Site Scripting | [b"$_GET['action']", b"$_GET['action']"] | | 601 | Cross-Site Scripting | [b"$_GET['for']", b"$_GET['for']"] | | 140 | Cross-Site Scripting | [b"$_POST['akismet_comment_nonce']", b"$_POST['akismet_comment_nonce']"] | | 144 | Cross-Site Scripting | [b"$_POST['_ajax_nonce-replyto-comment']"] | | 586 | Cross-Site Scripting | [b"$_POST['status']", b"$_POST['status']"] | | 588 | Cross-Site Scripting | [b"$_POST['spam']", b"$_POST['spam']"] | | 590 | Cross-Site Scripting | [b"$_POST['unspam']", b"$_POST['unspam']"] | | 592 | Cross-Site Scripting | [b"$_POST['comment_status']", b"$_POST['comment_status']"] | | 599 | Cross-Site Scripting | [b"$_POST['action']", b"$_POST['action']"] | | 214 | Cross-Site Scripting | [b"$_SERVER['HTTP_REFERER']", b"$_SERVER['HTTP_REFERER']"] | | 403 | Cross-Site Scripting | [b"$_SERVER['REQUEST_TIME_FLOAT']", b"$_SERVER['REQUEST_TIME_FLOAT']"] | | 861 | Cross-Site Scripting | [b"$_SERVER['REMOTE_ADDR']", b"$_SERVER['REMOTE_ADDR']"] | | 930 | Cross-Site Scripting | [b"$_SERVER['HTTP_USER_AGENT']", b"$_SERVER['HTTP_USER_AGENT']"] | | 934 | Cross-Site Scripting | [b"$_SERVER['HTTP_REFERER']", b"$_SERVER['HTTP_REFERER']"] | | 1349 | Cross-Site Scripting | [b"$_SERVER['REMOTE_ADDR']"] | ---------------------------------------------------------------------------------------------------------- [ i ] Scanning trunk/wrapper.php file [ + ] Not found vulnerabilities [ i ] Scanning trunk/akismet.php file ----------------------------------------------- | Line | Possibile Vuln. | String | ----------------------------------------------- | 55 | Authorization Hole | [b'is_admin()'] | ----------------------------------------------- [ i ] Scanning trunk/class.akismet-cli.php file [ + ] Not found vulnerabilities [ i ] Scanning trunk/class.akismet-widget.php file [ + ] Not found vulnerabilities [ i ] Scanning trunk/index.php file [ + ] Not found vulnerabilities [ i ] Scanning trunk/class.akismet-admin.php file -------------------------------------------------------------------------------------------------------------------- | Line | Possibile Vuln. | String | -------------------------------------------------------------------------------------------------------------------- | 39 | Cross-Site Scripting | [b"$_GET['page']", b"$_GET['page']"] | | 134 | Cross-Site Scripting | [b"$_GET['akismet_recheck']", b"$_GET['akismet_recheck']"] | | 152 | Cross-Site Scripting | [b"$_GET['view']", b"$_GET['view']"] | | 190 | Cross-Site Scripting | [b"$_GET['view']", b"$_GET['view']"] | | 388 | Cross-Site Scripting | [b"$_GET['recheckqueue']"] | | 841 | Cross-Site Scripting | [b"$_GET['view']", b"$_GET['view']"] | | 843 | Cross-Site Scripting | [b"$_GET['view']", b"$_GET['view']"] | | 850 | Cross-Site Scripting | [b"$_GET['action']"] | | 851 | Cross-Site Scripting | [b"$_GET['action']"] | | 852 | Cross-Site Scripting | [b"$_GET['_wpnonce']", b"$_GET['_wpnonce']"] | | 868 | Cross-Site Scripting | [b"$_GET['token']", b"$_GET['token']"] | | 869 | Cross-Site Scripting | [b"$_GET['token']"] | | 873 | Cross-Site Scripting | [b"$_GET['action']"] | | 874 | Cross-Site Scripting | [b"$_GET['action']"] | | 1005 | Cross-Site Scripting | [b"$_GET['akismet_recheck_complete']"] | | 1006 | Cross-Site Scripting | [b"$_GET['recheck_count']"] | | 1007 | Cross-Site Scripting | [b"$_GET['spam_count']"] | | 31 | Cross-Site Scripting | [b"$_POST['action']", b"$_POST['action']"] | | 256 | Cross-Site Scripting | [b"$_POST['_wpnonce']"] | | 260 | Cross-Site Scripting | [b'$_POST[$option]', b'$_POST[$option]'] | | 267 | Cross-Site Scripting | [b"$_POST['key']"] | | 392 | Cross-Site Scripting | [b"$_POST['offset']", b"$_POST['offset']", b"$_POST['limit']", b"$_POST['limit']"] | | 447 | Cross-Site Scripting | [b"$_POST['id']"] | | 448 | Cross-Site Scripting | [b"$_POST['id']"] | | 460 | Cross-Site Scripting | [b"$_POST['id']", b"$_POST['url']"] | | 461 | Cross-Site Scripting | [b"$_POST['id']"] | | 464 | Cross-Site Scripting | [b"$_POST['url']"] | | 388 | Cross-Site Scripting | [b"$_REQUEST['action']", b"$_REQUEST['action']"] | | 400 | Cross-Site Scripting | [b"$_SERVER['HTTP_REFERER']", b"$_SERVER['HTTP_REFERER']"] | -------------------------------------------------------------------------------------------------------------------- [ i ] Scanning trunk/class.akismet-rest-api.php file [ + ] Not found vulnerabilities
文章出处:黑客工具箱
本文由 华盟网 作者:karl456789 发表,其版权均为 华盟网 所有