Other > Viruses and worms

The average Word Press website could be better configured...

(1/2) > >>

polonus:
See: https://urlscan.io/result/80128967-730d-4219-aee6-98b0cc9a97d4

--- Quote --- Reputation Check
PASSED
Google Safe Browse: OK
Spamhaus Check: OK
Abuse CC: OK
Dshield Blocklist: OK
Cisco Talos Blacklist: OK
Web Server:
Apache
X-Powered-By:
PHP/7.2.21
IP Address:
198.54.125.177
Hosting Provider:
Namecheap. 
Shared Hosting:
139 sites found on 198.54.125.177
--- End quote ---


Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/      enabled
/wp-content/plugins/      disabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.

422 recommendations: https://webhint.io/scanner/d9ae17d2-7b93-46aa-ab1d-e218b237083f

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

polonus:
But one has to know when recommendations should be followed up and instances when this is not such a good idea.

For instance for Protocol Relative URLs: read -
https://technobabbl.es/2016/01/protocol-relative-urls-and-why-not-to-use-them/

This enabled the following abuse:
https://www.netresec.com/?page=Blog&month=2015-03&post=China%27s-Man-on-the-Side-Attack-on-GitHub

So configuration settings can be a two-sided-sword,with retire js found: for the chinese baidu script injections example->

--- Quote ---jquery   3.2.1.min   Found in -http://yingxiao.baidu.com/new/Public/static/Home/js/jquery-3.2.1.min.js?v=64c532e36e5403df70a70b7a01205c9e
Vulnerability info:
Medium   CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
--- End quote ---
WebGL invalid operations detected on fingerprint.js (pol),
see: https://www.cloudshark.org/captures/abfb3d44fa1c

We have been there before. see: https://forum.avast.com/index.php?topic=158336.0  ;)
scan here: https://securityheaders.com/ With Apache this could go as far as: https://logging.apache.org/log4php/rat-report.html

polonus

polonus:
There is a proposal now for websites with insecure outdated WP versions:
https://make.wordpress.org/core/2019/08/07/proposal-auto-update-old-versions-to-4-7/

This could lead to problems for users running certain plug-ins, certain insecure configurations, left code etc.

There is no cure for stupidity combined with sloppiness or when those that make decisions lack any relative knowledge
and still hold security for a last resort issue, where website maintanance is concerned.

WP websites make out 34,4 % of all websites online: https://w3techs.com/technologies/details/cm-wordpress/all/all
and some are quite big. Popular sites using WordPress
-Wordpress.com
-Otvfoco.com.br
-Chouftv.ma
-Exoclick.com
-Wordpress.org
-Geeksforgeeks.org
-Glassdoor.com
-Dkn.tv
-Okdiario.com
-Inquirer.net

polonus (volunteer 3rd party cold recon wesite security analyst and website error-hunter)

polonus:
Another example, which is also a PHISH:
https://urlquery.net/report/f1bd3a32-dc0c-4bf2-9925-e00357450ac1
Re: https://www.virustotal.com/gui/url/fa89c41cdd9c5b73083b073e9ccdf27497b7ab135faf26650ca534dd02306736/detection
3 engines to detect;

Unknown upload status plug-in: sitepress-multilingual-cms

 User Enumeration
  The first two user ID's were tested to determine if user enumeration is possible.

ID   User   Login
1   None   AfsAdmin
2   None   None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/      enabled
/wp-content/plugins/      disabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.

156 recommendations upon linting: https://webhint.io/scanner/c5f0cd93-a2f8-426e-85d1-b08015e67037

query   1.12.4   Found in -https://afsgonulluleri.org/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
Vulnerability info:
Medium   2432 3rd party CORS request may execute CVE-2015-9251   
Medium   CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium   CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

polonus:
Malicious on outdated WordPress version: https://urlquery.net/report/8f2cc5a0-8306-4e7a-8148-65e6ddc533ad
Re: https://urlhaus.abuse.ch/url/182714/
Detected by avast? -> https://www.virustotal.com/gui/file/18bbd30411778c812f8261c8301b1ef6dae3a3a0c004c597ef3188bb4562ead2/detection
-http://arenaaydin.com is in Dr.Web malicious sites list!

 User Enumeration
  The first two user ID's were tested to determine if user enumeration is possible.

ID   User   Login
1   None   arenaaydin
2   None   None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

/wp-content/uploads/      enabled
/wp-content/plugins/      disabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.

polonus

Navigation

[0] Message Index

[#] Next page

Go to full version