[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AC76E33.9010502@zerial.org>
Date: Sat, 03 Oct 2009 11:30:59 -0400
From: "Zerial." <fernando@...ial.org>
To: Victor Antonio Torre Villahoz <vtorre@...pasec.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: [EquipoFraude] Full Path Disclosure in most
wordpress' plugins [?]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Victor Antonio Torre Villahoz wrote:
> This not only happens in the plugins, all files in wp-admin/import/ have
> errors like it.
>
> I'm fix it using:
>
> if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
> ;//coninue
> }
> else{
> die();
> }
I've received an email which contains a lot of files which are
vulnerables to FPD:
wp-admin/includes/admin.php
wp-admin/includes/class-ftp-pure.php
wp-admin/includes/class-ftp-sockets.php
wp-admin/includes/class-wp-filesystem-direct.php
wp-admin/includes/class-wp-filesystem-ftpext.php
wp-admin/includes/class-wp-filesystem-ftpsockets.php
wp-admin/includes/class-wp-filesystem-ssh2.php
wp-admin/includes/comment.php
wp-admin/includes/continents-cities.php
wp-admin/includes/file.php
wp-admin/includes/media.php
wp-admin/includes/misc.php
wp-admin/includes/plugin-install.php
wp-admin/includes/plugin.php
wp-admin/includes/schema.php
wp-admin/includes/template.php
wp-admin/includes/theme-install.php
wp-admin/includes/update.php
wp-admin/includes/upgrade.php
wp-admin/includes/user.php
Solution:
if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
;//coninue
}
else{
die("Oops! Don't run this script directly, n00b");
}
//---- or
if ( defined('ABSPATH')){
die("Oops! Don't run this script directly, n00b");
>
>
> Fernando A. Lagos B. escribió:
>> Exists an call to add_action() without validate with function_exists().
>> When I run the php script directly, I get the full path of wp installation.
>
>> Example:
>> [+] http://www.marco2010.cl/wp-content/plugins/akismet/akismet.php
>> [+] http://www.marco2010.cl/wp-content/plugins/hello.php
>
>
>> Is a bug? Is a feature?
>
>> More details posted in my blog:
>> http://blog.zerial.org/seguridad/vulnerabilidad-en-la-mayoria-de-los-plugins-para-wordpress/
>> (spanish)
>
>
>> cheers.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
- --
Fernando A. Lagos Berardi - Zerial
Desarrollador y Programador Web
Seguridad Informatica
Linux User #382319
Blog: http://blog.zerial.org
Skype: erzerial
Jabber: zerial@...beres.org
GTalk && MSN: fernando@...ial.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAkrHbjMACgkQIP17Kywx9JQzBwCfX/9P2TUFi2aoqhFuMHowJw7y
oQ8AnAjwkug/QmJuYHEYJuLWz0DTiAl3
=QuHM
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists