lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4AC76E33.9010502@zerial.org>
Date: Sat, 03 Oct 2009 11:30:59 -0400
From: "Zerial." <fernando@...ial.org>
To: Victor Antonio Torre Villahoz <vtorre@...pasec.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: [EquipoFraude] Full Path Disclosure in most
 wordpress' plugins	[?]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Victor Antonio Torre Villahoz wrote:
> This not only happens in the plugins, all files in wp-admin/import/ have
> errors like it.
> 
> I'm fix it using:
> 
> if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
> ;//coninue
> }
> else{
> die();
> }


I've received an email which contains a lot of files which are
vulnerables to FPD:

wp-admin/includes/admin.php
wp-admin/includes/class-ftp-pure.php
wp-admin/includes/class-ftp-sockets.php
wp-admin/includes/class-wp-filesystem-direct.php
wp-admin/includes/class-wp-filesystem-ftpext.php
wp-admin/includes/class-wp-filesystem-ftpsockets.php
wp-admin/includes/class-wp-filesystem-ssh2.php
wp-admin/includes/comment.php
wp-admin/includes/continents-cities.php
wp-admin/includes/file.php
wp-admin/includes/media.php
wp-admin/includes/misc.php
wp-admin/includes/plugin-install.php
wp-admin/includes/plugin.php
wp-admin/includes/schema.php
wp-admin/includes/template.php
wp-admin/includes/theme-install.php
wp-admin/includes/update.php
wp-admin/includes/upgrade.php
wp-admin/includes/user.php

Solution:

if ( defined('WP_ADMIN') or defined('WP_USE_THEMES') ){
;//coninue
}
else{
die("Oops! Don't run this script directly, n00b");
}
//---- or
if ( defined('ABSPATH')){
die("Oops! Don't run this script directly, n00b");

> 
> 
> Fernando A. Lagos B. escribió:
>> Exists an call to add_action() without validate with function_exists().
>> When I run the php script directly, I get the full path of wp installation.
> 
>> Example:
>> [+] http://www.marco2010.cl/wp-content/plugins/akismet/akismet.php
>> [+] http://www.marco2010.cl/wp-content/plugins/hello.php
> 
> 
>> Is a bug? Is a feature?
> 
>> More details posted in my blog:
>> http://blog.zerial.org/seguridad/vulnerabilidad-en-la-mayoria-de-los-plugins-para-wordpress/
>> (spanish)
> 
> 
>> cheers.
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 

- --
Fernando A. Lagos Berardi - Zerial
Desarrollador y Programador Web
Seguridad Informatica
Linux User #382319
Blog: http://blog.zerial.org
Skype: erzerial
Jabber: zerial@...beres.org
GTalk && MSN: fernando@...ial.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkrHbjMACgkQIP17Kywx9JQzBwCfX/9P2TUFi2aoqhFuMHowJw7y
oQ8AnAjwkug/QmJuYHEYJuLWz0DTiAl3
=QuHM
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ