Author Topic: Another example of Server Side (In)security through Obscurity?  (Read 1033 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33915
  • malware fighter
Another example of Server Side (In)security through Obscurity?
« on: December 06, 2019, 02:13:41 PM »
Look for this script @ -security nl -  -https://www.security.nl/js/jquery/jquery.securitynl.js?13757912939
which in a third party cold recon scan will opens up to: 
-https://a.trellocdn.com/prgb/dist/br/cookieConsent.1ae01bd1beb7c08d31c7.js
having a threat security risck of -2
server has AmazonS3 announced, that means"excessive server info proliferation" in the AWS Cloud.
Read for risks (think of insecure S3 buckets etc.) here:
https://docs.aws.amazon.com/AmazonS3/latest/dev/vulnerability-analysis-and-management.html
Only settings for TLS set, no specific security header settings.
So -https://a.trellocdn.com/prgb/dist/br/cookieConsent.1ae01bd1beb7c08d31c7.js - seems Ok for the mean time.
Netcraft Risk  =1 red out of 10: https://toolbar.netcraft.com/site_report?url=+https%3A%2F%2Fa.trellocdn.com%2Fprgb%2Fdist%2Fbr%2FcookieConsent.1ae01bd1beb7c08d31c7.js

Consider however -> https://www.shodan.io/host/2.16.138.112 with a Heap-Based-Buffer-Overflow vuln.
of which Akamai knows exists for AamaiGHost.

This is a plubic flaw and Akamai tries to establish how far they are vulnerable to this vulnerability and whether it is exploitable.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33915
  • malware fighter
Re: Another example of Server Side (In)security through Obscurity?
« Reply #1 on: December 06, 2019, 02:41:37 PM »
And it is more often found that client-side and webserver side "won't always play ball as it should", so to put it.  ;)

The second above example can also open up to:  -https://tequila-stuff.com/wp-content/plugins/penci-recipe/js/jquery.rateyo.min.js
Number of sources found: 17
Number of sinks found: 2
Consider flaws there: https://sitecheck.sucuri.net/results/https/tequila-stuff.com

See also: https://retire.insecurity.today/#!/scan/7c48470ecfb90afb98d030da83bfae15ba8886d3075d3e4886526acfd8141f84
1 vuln. jQuery library detected.

Server flaws:
http://nginx.org/en/security_advisories.html
because of Outdated Software Detected - Nginx under 1.17.3

Outdated plug-in contact-form-7 5.1.4   latest release (5.1.6)
https://contactform7.com/
Also outdated -> google-analytics-for-wordpress 7.8.0   latest release (7.10.1)
https://www.monsterinsights.com/

Wrong Configuration of CMS: User Enumeration
  The first two user ID's were tested to determine if user enumeration is possible.

ID   User   Login
1   None   topup
2   None   None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Google Safe Browse checks have been performed on each of the linked sites. Links with poor reputation could be a threat to users of the site. Hosting and location are also included in the results.

Externally Linked Host   Hosting Provider   Country   
    -www.facebook.com   Facebook.   Ireland    
    -twitter.com   Twitter Inc.   United States    
    -soledad.pencidesign.com   Linode   United States    
    -wordpress.org   SingleHop LLC   United States    
    -topup.bet   Choopa   Singapore    

On hoster exploitable  nginxVersion: 1.15.9 (Febr. last main) see: https://github.com/nixawk/labs/issues/15

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

See: https://www.shodan.io/host/140.82.52.247
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33915
  • malware fighter
Re: Another example of Server Side (In)security through Obscurity?
« Reply #2 on: December 06, 2019, 03:13:38 PM »
Doing the roud via DOM-XSS flaw scanning we land here at this vulnerable site (not malicious):
Results from scanning URL: -http://www.kosmetik-grenchen.ch
Number of sources found: 51
Number of sinks found: 58

WordPress Version
5.1.3
Version does not appear to be latest 5.3 - update now.

TLS recommendations - medium risk: https://sitecheck.sucuri.net/results/www.kosmetik-grenchen.ch

Outdated plug-in: google-analyticator 6.2   latest release (6.5.4)
http://www.videousermanuals.com/google-analyticator/ 

Host: https://www.shodan.io/host/185.117.168.162 
Netcraft Risk factor 1 red out of 10:  https://toolbar.netcraft.com/site_report?url=server27.hostfactory.ch

Nothing here: https://www.virustotal.com/gui/ip-address/185.117.168.160/relations

Insecure by default: Website is insecure by default
100% of the trackers on this site could be protecting you from NSA snooping. Tell -hostfactory.ch to fix it.

Identifiers | All Trackers
 Insecure Identifiers
Unique IDs about your web browsing habits have been insecurely sent to third parties.

6rr0efm77jXXXXXXXXXXXX6jma www.hostfactory.chphpsessid

For PHP vuln. read: https://www.security-database.com/detail.php?alert=DSA-4353

polonus
« Last Edit: December 06, 2019, 04:02:28 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!