[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 2 Feb 2014 00:56:58 +1100
From: Andrew Horton <horton.nz@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Bypass the Stop User Enumeration WordPress Plugin
Stop User Enumeration is a WordPress plugin that provides protection
against an unauthenticated attacker gaining a list of all WordPress users.
This information can aid an attacker in further attacks against the website
including brute-force password guessing attacks. This can be performed
using wp-scan.
Homepage: http://wordpress.org/plugins/stop-user-enumeration/
Version: 1.2.4 (latest)
According to the full disclosure methodology I have publicly disclosed
this at the same time as notifying the vendor.
Advisory
-------------
An attacker can bypass the username enumeration protection by using POST
requests. The protection currently only stops GET requests to enumerate
users.
By sending POST requests with the body of "author=1" and incrementing the
number over successive requests, the entire set of WordPress users can be
enumerated.
The WordPress user information is disclosed in the HTML response body,
unlike being disclosed in the redirect header, as with GET requests.
1.
POST / HTTP/1.1
Host: www.wordpress.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 8
author=1
Andrew Horton (urbanadventurer)
www.morningstarsecurity.com
Visit my meta-aggregator of security news at
http://www.morningstarsecurity.com/news/
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists