Author Topic: Hacked and defaced website with vulnerabilities...  (Read 1182 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33891
  • malware fighter
Hacked and defaced website with vulnerabilities...
« on: May 27, 2016, 01:24:40 PM »
Re: http://killmalware.com/die-apis-denkendorf.de/
-http://www.die-apis-denkendorf.de/
Detected libraries:
jquery - 1.6.1 : (active1) -http://www.die-apis-denkendorf.de/wp-includes/js/jquery/jquery.js?ver=1.6.1
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected

WordPress Version
3.2.1
Version does not appear to be latest 4.5.2 - update now.

A-Status: https://sritest.io/#report/c1e39ca0-8dbe-4143-8b33-e04c79bf2b40

Hosting reverse DNS DROWn vulnerable: https://test.drownattack.com/?site=%09lex.servertools24.de

Vulnerable log-in: http://www.domxssscanner.com/scan?url=http%3A%2F%2Flex.servertools24.de%2Fuser%2Findex.phplo
Form.elements.name hack to show hidden form fields possible?

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!