scan

Offsec - SoSimple - Jun 4th 2023

Offsec - SoSimple - Jun 4th 2023

Target: [LAB_IP]

start with the scan of it all. I really only care when it's all done so I turned off verbose mode.

nmap -sV -sC -p- [LAB_IP] --open -oN sosimple.scan

Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-05 06:41 EDT

Nmap scan report for [LAB_IP]

Host is up (0.071s latency).

Not shown: 64168 closed tcp ports (conn-refused), 1365 filtered tcp ports (no-response)

Some closed ports may be reported as filtered due to --defeat-rst-ratelimit

PORT   STATE SERVICE VERSION

22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0)

| ssh-hostkey:

|   3072 [HASH_REDACTED] (RSA)

|   256 [HASH_REDACTED] (ECDSA)

|_  256 [HASH_REDACTED] (ED25519)

80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))

|_http-title: So Simple

|_http-server-header: Apache/2.4.41 (Ubuntu)

Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Check port 80

So Simple so simple

I ran both dirb and gobuster with my favorite for memory being dirb since it's easy to remember then go buster for speed

dirb http://[LAB_IP]/  /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

gobuster dir -u http://[LAB_IP]/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

Both yielded http://[LAB_IP]/wordpress/

Now to scan the wordpress installation via wpscan

→  wpscan http://[LAB_IP]/wordpress/                                                                06:54:32

One of the following options is required: --url, --update, --help, --hh, --version

Please use --help/-h for the list of available options.

⚠   kali  🏡

→  wpscan --url http://[LAB_IP]/wordpress/                                                          06:54:38


__          _______   _____

\ \        / /  __ \ / ____|

\ \  /\  / /| |) | (_   ___  __ _ _ __ ®

\ /  / / |  _/ _ \ / __|/ ` | ' \

\  /\  /  | |     _) | (| (| | | | |

/  /   ||    |___/ _|_,|| |_|

WordPress Security Scanner by the WPScan Team

Version 3.8.22

@WPScan, @ethicalhack3r, @erwan_lr, @firefart


[i] Updating the Database ...

[i] Update completed.

[+] URL: http://[LAB_IP]/wordpress/ [[LAB_IP]]

[+] Started: Mon Jun  5 06:54:48 2023

Interesting Finding(s):

[+] Headers

| Interesting Entry: Server: Apache/2.4.41 (Ubuntu)

| Found By: Headers (Passive Detection)

| Confidence: 100%

[+] XML-RPC seems to be enabled: http://[LAB_IP]/wordpress/xmlrpc.php

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

| References:

|  - http://codex.wordpress.org/XML-RPC_Pingback_API

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/

|  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://[LAB_IP]/wordpress/readme.html

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

[+] Upload directory has listing enabled: http://[LAB_IP]/wordpress/wp-content/uploads/

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://[LAB_IP]/wordpress/wp-cron.php

| Found By: Direct Access (Aggressive Detection)

| Confidence: 60%

| References:

|  - https://www.iplocation.net/defend-wordpress-from-ddos

|  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.4.2 identified (Insecure, released on 2020-06-10).

| Found By: Rss Generator (Passive Detection)

|  - http://[LAB_IP]/wordpress/index.php/feed/, https://wordpress.org/?v=5.4.2

|  - http://[LAB_IP]/wordpress/index.php/comments/feed/, https://wordpress.org/?v=5.4.2

[+] WordPress theme in use: twentynineteen

| Location: http://[LAB_IP]/wordpress/wp-content/themes/twentynineteen/

| Last Updated: 2023-03-29T00:00:00.000Z

| Readme: http://[LAB_IP]/wordpress/wp-content/themes/twentynineteen/readme.txt

| [!] The version is out of date, the latest version is 2.5

| Style URL: http://[LAB_IP]/wordpress/wp-content/themes/twentynineteen/style.css?ver=1.6

| Style Name: Twenty Nineteen

| Style URI: https://wordpress.org/themes/twentynineteen/

| Description: Our 2019 default theme is designed to show off the power of the block editor. It features custom sty...

| Author: the WordPress team

| Author URI: https://wordpress.org/

|

| Found By: Css Style In Homepage (Passive Detection)

|

| Version: 1.6 (80% confidence)

| Found By: Style (Passive Detection)

|  - http://[LAB_IP]/wordpress/wp-content/themes/twentynineteen/style.css?ver=1.6, Match: 'Version: 1.6'

[+] Enumerating All Plugins (via Passive Methods)

[+] Checking Plugin Versions (via Passive and Aggressive Methods)

[i] Plugin(s) Identified:

[+] simple-cart-solution

| Location: http://[LAB_IP]/wordpress/wp-content/plugins/simple-cart-solution/

| Last Updated: 2022-04-17T20:50:00.000Z

| [!] The version is out of date, the latest version is 1.0.2

|

| Found By: Urls In Homepage (Passive Detection)

|

| Version: 0.2.0 (100% confidence)

| Found By: Query Parameter (Passive Detection)

|  - http://[LAB_IP]/wordpress/wp-content/plugins/simple-cart-solution/assets/dist/js/public.js?ver=0.2.0

| Confirmed By:

|  Readme - Stable Tag (Aggressive Detection)

|   - http://[LAB_IP]/wordpress/wp-content/plugins/simple-cart-solution/readme.txt

|  Readme - ChangeLog Section (Aggressive Detection)

|   - http://[LAB_IP]/wordpress/wp-content/plugins/simple-cart-solution/readme.txt

[+] social-warfare

| Location: http://[LAB_IP]/wordpress/wp-content/plugins/social-warfare/

| Last Updated: 2023-02-15T16:23:00.000Z

| [!] The version is out of date, the latest version is 4.4.1

|

| Found By: Urls In Homepage (Passive Detection)

| Confirmed By: Comment (Passive Detection)

|

| Version: 3.5.0 (100% confidence)

| Found By: Comment (Passive Detection)

|  - http://[LAB_IP]/wordpress/, Match: 'Social Warfare v3.5.0'

| Confirmed By:

|  Query Parameter (Passive Detection)

|   - http://[LAB_IP]/wordpress/wp-content/plugins/social-warfare/assets/css/style.min.css?ver=3.5.0

|   - http://[LAB_IP]/wordpress/wp-content/plugins/social-warfare/assets/js/script.min.js?ver=3.5.0

|  Readme - Stable Tag (Aggressive Detection)

|   - http://[LAB_IP]/wordpress/wp-content/plugins/social-warfare/readme.txt

|  Readme - ChangeLog Section (Aggressive Detection)

|   - http://[LAB_IP]/wordpress/wp-content/plugins/social-warfare/readme.txt

[+] Enumerating Config Backups (via Passive and Aggressive Methods)

Checking Config Backups - Time: 00:00:02 <=====================================> (137 / 137) 100.00% Time: 00:00:02

[i] No Config Backups Found.

[!] No WPScan API Token given, as a result vulnerability data has not been output.

[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Mon Jun  5 06:54:57 2023

[+] Requests Done: 190

[+] Cached Requests: 5

[+] Data Sent: 50.604 KB

[+] Data Received: 20.556 MB

[+] Memory used: 269.316 MB

[+] Elapsed time: 00:00:08

Apparently I can run it with an API check for vulnerable plugins from the command so I signed up for the free API token

Redoing the command with the plugin detection to save me some searchsploit queries

wpscan --url http://[LAB_IP]/wordpress/ --plugins-detection aggressive --api-token evfnufBAHle2ozuii6T1o2bcxZ59ifBEDOfhroz7RX4


__          _______   _____

\ \        / /  __ \ / ____|

\ \  /\  / /| |) | (_   ___  __ _ _ __ ®

\ /  / / |  _/ _ \ / __|/ ` | ' \

\  /\  /  | |     _) | (| (| | | | |

/  /   ||    |___/ _|_,|| |_|

WordPress Security Scanner by the WPScan Team

Version 3.8.22

Sponsored by Automattic - https://automattic.com/

@WPScan, @ethicalhack3r, @erwan_lr, @firefart


[+] URL: http://[LAB_IP]/wordpress/ [[LAB_IP]]

[+] Started: Mon Jun  5 07:04:41 2023

Interesting Finding(s):

[+] Headers

| Interesting Entry: Server: Apache/2.4.41 (Ubuntu)

| Found By: Headers (Passive Detection)

| Confidence: 100%

[+] XML-RPC seems to be enabled: http://[LAB_IP]/wordpress/xmlrpc.php

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

| References:

|  - http://codex.wordpress.org/XML-RPC_Pingback_API

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/

|  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/

|  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://[LAB_IP]/wordpress/readme.html

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

[+] Upload directory has listing enabled: http://[LAB_IP]/wordpress/wp-content/uploads/

| Found By: Direct Access (Aggressive Detection)

| Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://[LAB_IP]/wordpress/wp-cron.php

| Found By: Direct Access (Aggressive Detection)

| Confidence: 60%

| References:

|  - https://www.iplocation.net/defend-wordpress-from-ddos

|  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.4.2 identified (Insecure, released on 2020-06-10).

| Found By: Rss Generator (Passive Detection)

|  - http://[LAB_IP]/wordpress/index.php/feed/, https://wordpress.org/?v=5.4.2

|  - http://[LAB_IP]/wordpress/index.php/comments/feed/, https://wordpress.org/?v=5.4.2

|

| [!] 33 vulnerabilities identified:

|

| [!] Title: WordPress 4.7-5.7 - Authenticated Password Protected Pages Exposure

|     Fixed in: 5.4.5

|     References:

|      - https://wpscan.com/vulnerability/6a3ec618-c79e-4b9c-9020-86b157458ac5

|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29450

|      - https://wordpress.org/news/2021/04/wordpress-5-7-1-security-and-maintenance-release/

|      - https://blog.wpscan.com/2021/04/15/wordpress-571-security-vulnerability-release.html

|      - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-pmmh-2f36-wvhq

|      - https://core.trac.wordpress.org/changeset/50717/

|      - https://www.youtube.com/watch?v=J2GXmxAdNWs

|

| [!] Title: WordPress 3.7 to 5.7.1 - Object Injection in PHPMailer

|     Fixed in: 5.4.6

|     References:

|      - https://wpscan.com/vulnerability/4cd46653-4470-40ff-8aac-318bee2f998d

|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36326

|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19296

|      - https://github.com/WordPress/WordPress/commit/267061c9595fedd321582d14c21ec9e7da2dcf62

|      - https://wordpress.org/news/2021/05/wordpress-5-7-2-security-release/

|      - https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9

|      - https://www.wordfence.com/blog/2021/05/wordpress-5-7-2-security-release-what-you-need-to-know/

|      - https://www.youtube.com/watch?v=HaW15aMzBUM

|

| [!] Title: WordPress 5.4 to 5.8 -  Lodash Library Update

|     Fixed in: 5.4.7

|     References:

|      - https://wpscan.com/vulnerability/5d6789db-e320-494b-81bb-e678674f4199

|      - https://wordpress.org/news/2021/09/wordpress-5-8-1-security-and-maintenance-release/

|      - https://github.com/lodash/lodash/wiki/Changelog

|      - https://github.com/WordPress/wordpress-develop/commit/fb7ecd92acef6c813c1fde6d9d24a21e02340689

|

| [!] Title: WordPress 5.4 to 5.8 - Authenticated XSS in Block Editor

|     Fixed in: 5.4.7

|     References:

|      - https://wpscan.com/vulnerability/5b754676-20f5-4478-8fd3-6bc383145811

|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39201

|      - https://wordpress.org/news/2021/09/wordpress-5-8-1-security-and-maintenance-release/

|      - https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v

|

| [!] Title: WordPress 5.4 to 5.8 - Data Exposure via REST API

|     Fixed in: 5.4.7

|     References:

|      - https://wpscan.com/vulnerability/38dd7e87-9a22-48e2-bab1-dc79448ecdfb

|      - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39200

|      - https://wordpress.org/news/2021/09/wordpress-5-8-1-security-and-maintenance-release/

|      - https://github.com/WordPress/wordpress-develop/commit/ca4765c62c65acb732b574a6761bf5fd84595706