|
Full Disclosure
mailing list archives
Re: Wordpress Remote Exploit - W3 Total Cache
From: Grandma Eubanks <tborland1 () gmail com>
Date: Mon, 24 Dec 2012 10:42:50 -0600
This reminds me of a funny story about a decently popular database plugin
for WordPress. Even though they use a bruteforceable value based on time of
creation, there was something even funnier. A person would make a quick
database backup and it would just place it in the backups folder, that by
default wasn't a protected directory (nor was there an option to do it via
the plugin), and you could just view && download all the backups freely.
Again, hashes and associated salt(s) were available from here.
I'll leave it for someone else to ruin what plugin it is. I use it
currently in a capture the flag game as bonus points.
On Mon, Dec 24, 2012 at 6:12 AM, Jason A. Donenfeld <Jason () zx2c4 com> wrote:
On Mon, Dec 24, 2012 at 7:39 AM, Jason A. Donenfeld <Jason () zx2c4 com>
wrote:
hashes. A simple google search of
"inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic
An astute reader writes to me privately that the /plugins/ part of
that googledork isn't correct, and that the best way to search is
actually:
inurl:wp-content/w3tc
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|