Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Wordpress Remote Exploit - W3 Total Cache
From: Grandma Eubanks <tborland1 () gmail com>
Date: Mon, 24 Dec 2012 10:42:50 -0600

This reminds me of a funny story about a decently popular database plugin
for WordPress. Even though they use a bruteforceable value based on time of
creation, there was something even funnier. A person would make a quick
database backup and it would just place it in the backups folder, that by
default wasn't a protected directory (nor was there an option to do it via
the plugin), and you could just view && download all the backups freely.
Again, hashes and associated salt(s) were available from here.

I'll leave it for someone else to ruin what plugin it is. I use it
currently in a capture the flag game as bonus points.

On Mon, Dec 24, 2012 at 6:12 AM, Jason A. Donenfeld <Jason () zx2c4 com> wrote:

On Mon, Dec 24, 2012 at 7:39 AM, Jason A. Donenfeld <Jason () zx2c4 com>
wrote:
hashes. A simple google search of
"inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic

An astute reader writes to me privately that the /plugins/ part of
that googledork isn't correct, and that the best way to search is
actually:

inurl:wp-content/w3tc

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault