Merge pull request #2 from wpscanteam/master

Update master
This commit is contained in:
Peter van der Laan
2013-11-08 05:36:38 -08:00
16 changed files with 1334 additions and 1986 deletions

1
.gitignore vendored
View File

@@ -1,5 +1,6 @@
cache/* cache/*
coverage coverage
.bundle
.DS_Store .DS_Store
.DS_Store? .DS_Store?
*.sublime-* *.sublime-*

View File

@@ -17,3 +17,4 @@ Callum Pember - Implemented proxy support - callumpember at gmail.com
g0tmi1k - Additional timthumb checks + bug reports. g0tmi1k - Additional timthumb checks + bug reports.
Melvin Lammerts - Reported a couple of fake vulnerabilities - melvin at 12k.nl Melvin Lammerts - Reported a couple of fake vulnerabilities - melvin at 12k.nl
Paolo Perego - @thesp0nge - Basic authentication Paolo Perego - @thesp0nge - Basic authentication
Peter van der Laan - The Vuln Hunter and Code Cleaner

View File

@@ -7,7 +7,7 @@ gem "json"
gem "terminal-table" gem "terminal-table"
gem "ruby-progressbar", ">=1.2.0" gem "ruby-progressbar", ">=1.2.0"
group :development, :test do group :test do
gem "webmock", ">=1.9.3" gem "webmock", ">=1.9.3"
gem "simplecov" gem "simplecov"
gem "rspec", :require => "spec" gem "rspec", :require => "spec"

8
README
View File

@@ -49,14 +49,14 @@ ryandewhurst at gmail
sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby libxml2 libxml2-dev libxslt1-dev ruby-dev sudo apt-get install libcurl4-gnutls-dev libopenssl-ruby libxml2 libxml2-dev libxslt1-dev ruby-dev
git clone https://github.com/wpscanteam/wpscan.git git clone https://github.com/wpscanteam/wpscan.git
cd wpscan cd wpscan
sudo gem install bundler && bundle install --without test development sudo gem install bundler && bundle install --without test
-> Installing on Fedora: -> Installing on Fedora:
sudo yum install gcc ruby-devel libxml2 libxml2-devel libxslt libxslt-devel libcurl-devel sudo yum install gcc ruby-devel libxml2 libxml2-devel libxslt libxslt-devel libcurl-devel
git clone https://github.com/wpscanteam/wpscan.git git clone https://github.com/wpscanteam/wpscan.git
cd wpscan cd wpscan
sudo gem install bundler && bundle install --without test development sudo gem install bundler && bundle install --without test
-> Installing on Archlinux: -> Installing on Archlinux:
@@ -65,7 +65,7 @@ ryandewhurst at gmail
git clone https://github.com/wpscanteam/wpscan.git git clone https://github.com/wpscanteam/wpscan.git
cd wpscan cd wpscan
sudo gem install bundler && bundle install --without test development sudo gem install bundler && bundle install --without test
gem install typhoeus gem install typhoeus
gem install nokogiri gem install nokogiri
@@ -76,7 +76,7 @@ ryandewhurst at gmail
git clone https://github.com/wpscanteam/wpscan.git git clone https://github.com/wpscanteam/wpscan.git
cd wpscan cd wpscan
sudo gem install bundler && bundle install --without test development sudo gem install bundler && bundle install --without test
==KNOWN ISSUES== ==KNOWN ISSUES==

View File

@@ -48,7 +48,7 @@ Prerequisites:
```cd wpscan``` ```cd wpscan```
```sudo gem install bundler && bundle install --without test development``` ```sudo gem install bundler && bundle install --without test```
*Installing on Fedora:* *Installing on Fedora:*
@@ -58,7 +58,7 @@ Prerequisites:
```cd wpscan``` ```cd wpscan```
```sudo gem install bundler && bundle install --without test development``` ```sudo gem install bundler && bundle install --without test```
*Installing on Archlinux:* *Installing on Archlinux:*
@@ -70,7 +70,7 @@ Prerequisites:
```cd wpscan``` ```cd wpscan```
```sudo gem install bundler && bundle install --without test development``` ```sudo gem install bundler && bundle install --without test```
```gem install typhoeus``` ```gem install typhoeus```
@@ -84,7 +84,7 @@ Apple Xcode, Command Line Tools and the libffi are needed (to be able to install
```cd wpscan``` ```cd wpscan```
```sudo gem install bundler && bundle install --without test development``` ```sudo gem install bundler && bundle install --without test```
#### KNOWN ISSUES #### KNOWN ISSUES

View File

@@ -5,7 +5,7 @@
<plugin name="content-slide"> <plugin name="content-slide">
<vulnerability> <vulnerability>
<title>Content Slide &lt;=1.4.2 - Cross Site Requst Forgery Vulnerability</title> <title>Content Slide &lt;= 1.4.2 - Cross Site Requst Forgery Vulnerability</title>
<references> <references>
<osvdb>93871</osvdb> <osvdb>93871</osvdb>
<cve>2013-2708</cve> <cve>2013-2708</cve>
@@ -123,8 +123,7 @@
<title>Crayon Syntax Highlighter - Remote File Inclusion Vulnerability</title> <title>Crayon Syntax Highlighter - Remote File Inclusion Vulnerability</title>
<references> <references>
<secunia>50804</secunia> <secunia>50804</secunia>
<url>http://ceriksen.com/2012/10/15/wordpress-crayon-syntax-highlighter-remote-file-inclusion-vulnerability/ <url>http://ceriksen.com/2012/10/15/wordpress-crayon-syntax-highlighter-remote-file-inclusion-vulnerability/</url>
</url>
</references> </references>
<type>RFI</type> <type>RFI</type>
<fixed_in>1.13</fixed_in> <fixed_in>1.13</fixed_in>
@@ -152,7 +151,7 @@
<plugin name="thanks-you-counter-button"> <plugin name="thanks-you-counter-button">
<vulnerability> <vulnerability>
<title>Thank You Counter Button &lt;=1.8.2 - XSS</title> <title>Thank You Counter Button &lt;= 1.8.2 - XSS</title>
<references> <references>
<secunia>50977</secunia> <secunia>50977</secunia>
</references> </references>
@@ -163,7 +162,7 @@
<plugin name="bookings"> <plugin name="bookings">
<vulnerability> <vulnerability>
<title>Bookings &lt;=1.8.2 - XSS</title> <title>Bookings &lt;= 1.8.2 - XSS</title>
<references> <references>
<secunia>50975</secunia> <secunia>50975</secunia>
</references> </references>
@@ -174,7 +173,7 @@
<plugin name="cimy-user-manager"> <plugin name="cimy-user-manager">
<vulnerability> <vulnerability>
<title>Cimy User Manager &lt;=1.4.2 - Arbitrary File Disclosure</title> <title>Cimy User Manager &lt;= 1.4.2 - Arbitrary File Disclosure</title>
<references> <references>
<secunia>50834</secunia> <secunia>50834</secunia>
<url>http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/</url> <url>http://ceriksen.com/2012/10/24/wordpress-cimy-user-manager-arbitrary-file-disclosure/</url>
@@ -197,9 +196,7 @@
<title>FireStorm Professional Real Estate - Multiple SQL Injection</title> <title>FireStorm Professional Real Estate - Multiple SQL Injection</title>
<references> <references>
<secunia>50873</secunia> <secunia>50873</secunia>
<url> <url>http://ceriksen.com/2012/10/25/wordpress-firestorm-professional-real-estate-plugin-sql-injection-vulnerability/</url>
http://ceriksen.com/2012/10/25/wordpress-firestorm-professional-real-estate-plugin-sql-injection-vulnerability/
</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
<fixed_in>2.06.03</fixed_in> <fixed_in>2.06.03</fixed_in>
@@ -208,7 +205,7 @@
<plugin name="wp125"> <plugin name="wp125">
<vulnerability> <vulnerability>
<title>WP125 &lt;=1.4.4 - Multiple XSS</title> <title>WP125 &lt;= 1.4.4 - Multiple XSS</title>
<references> <references>
<secunia>50976</secunia> <secunia>50976</secunia>
</references> </references>
@@ -216,7 +213,7 @@
<fixed_in>1.4.5</fixed_in> <fixed_in>1.4.5</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP125 &lt;=1.4.9 - CSRF</title> <title>WP125 &lt;= 1.4.9 - CSRF</title>
<references> <references>
<osvdb>92113</osvdb> <osvdb>92113</osvdb>
<cve>2013-2700</cve> <cve>2013-2700</cve>
@@ -290,8 +287,7 @@
<secunia>50832</secunia> <secunia>50832</secunia>
<url>http://www.securityfocus.com/bid/57133</url> <url>http://www.securityfocus.com/bid/57133</url>
<url>http://packetstormsecurity.com/files/119329/</url> <url>http://packetstormsecurity.com/files/119329/</url>
<url>http://ceriksen.com/2013/01/03/wordpress-google-document-embedder-arbitrary-file-disclosure/ <url>http://ceriksen.com/2013/01/03/wordpress-google-document-embedder-arbitrary-file-disclosure/</url>
</url>
<metasploit>exploit/unix/webapp/wp_google_document_embedder_exec</metasploit> <metasploit>exploit/unix/webapp/wp_google_document_embedder_exec</metasploit>
</references> </references>
<type>UNKNOWN</type> <type>UNKNOWN</type>
@@ -551,9 +547,7 @@
<title>Asset Manager - upload.php Arbitrary Code Execution</title> <title>Asset Manager - upload.php Arbitrary Code Execution</title>
<references> <references>
<osvdb>82653</osvdb> <osvdb>82653</osvdb>
<url> <url>http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/</url>
http://www.ethicalhack3r.co.uk/security/wordpress-plugin-asset-manager-upload-php-arbitrary-code-execution/
</url>
<url>http://packetstormsecurity.com/files/113285/</url> <url>http://packetstormsecurity.com/files/113285/</url>
<url>http://xforce.iss.net/xforce/xfdb/80823</url> <url>http://xforce.iss.net/xforce/xfdb/80823</url>
</references> </references>
@@ -593,11 +587,12 @@
<plugin name="comment-extra-field"> <plugin name="comment-extra-field">
<vulnerability> <vulnerability>
<title>SWF Vulnerable to XSS Bundled in Many WordPress Plugins</title> <title>Comment Extra Field 1.7 - CSRF / XSS</title>
<references> <references>
<url>http://packetstormsecurity.com/files/122625/</url>
<url>http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html</url> <url>http://brindi.si/g/blog/vulnerable-swf-bundled-in-wordpress-plugins.html</url>
</references> </references>
<type>XSS</type> <type>MULTI</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -675,7 +670,7 @@
<vulnerability> <vulnerability>
<title>powerzoomer - Arbitrary File Upload Vulnerability</title> <title>powerzoomer - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20253</url> <url>http://1337day.com/exploit/20253</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -753,7 +748,7 @@
<vulnerability> <vulnerability>
<title>wp-3dflick-slideshow - Arbitrary File Upload Vulnerability</title> <title>wp-3dflick-slideshow - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20255</url> <url>http://1337day.com/exploit/20255</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -839,7 +834,7 @@
<vulnerability> <vulnerability>
<title>wp-homepage-slideshow - Arbitrary File Upload Vulnerability</title> <title>wp-homepage-slideshow - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20260</url> <url>http://1337day.com/exploit/20260</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -856,7 +851,7 @@
<vulnerability> <vulnerability>
<title>wp-image-news-slider - Arbitrary File Upload Vulnerability</title> <title>wp-image-news-slider - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20259</url> <url>http://1337day.com/exploit/20259</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -891,7 +886,7 @@
<vulnerability> <vulnerability>
<title>wp-levoslideshow - Arbitrary File Upload Vulnerability</title> <title>wp-levoslideshow - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20250</url> <url>http://1337day.com/exploit/20250</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -918,7 +913,7 @@
<vulnerability> <vulnerability>
<title>wp-powerplaygallery - Arbitrary File Upload Vulnerability</title> <title>wp-powerplaygallery - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20252</url> <url>http://1337day.com/exploit/20252</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -935,7 +930,7 @@
<vulnerability> <vulnerability>
<title>wp-royal-gallery - Arbitrary File Upload Vulnerability</title> <title>wp-royal-gallery - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20261</url> <url>http://1337day.com/exploit/20261</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -1021,7 +1016,7 @@
<vulnerability> <vulnerability>
<title>Spider Catalog - Multiple SQL Injection and Cross Site Scripting Vulnerabilities</title> <title>Spider Catalog - Multiple SQL Injection and Cross Site Scripting Vulnerabilities</title>
<references> <references>
<url>http://www.securityfocus.com/bid/60079/info</url> <url>http://www.securityfocus.com/bid/60079</url>
</references> </references>
<type>MULTI</type> <type>MULTI</type>
</vulnerability> </vulnerability>
@@ -1087,9 +1082,7 @@
<vulnerability> <vulnerability>
<title>ABtest - Directory Traversal</title> <title>ABtest - Directory Traversal</title>
<references> <references>
<url> <url>http://scott-herbert.com/blog/2012/10/11/wordpress-plugin-abtest-vulnerable-to-a-directory-traversal-attack-1110</url>
http://scott-herbert.com/blog/2012/10/11/wordpress-plugin-abtest-vulnerable-to-a-directory-traversal-attack-1110
</url>
</references> </references>
<type>UNKNOWN</type> <type>UNKNOWN</type>
</vulnerability> </vulnerability>
@@ -1694,7 +1687,7 @@
<plugin name="wp-property"> <plugin name="wp-property">
<vulnerability> <vulnerability>
<title>WP Property &lt;=1.35.0 - Arbitrary File Upload</title> <title>WP Property &lt;= 1.35.0 - Arbitrary File Upload</title>
<references> <references>
<exploitdb>18987</exploitdb> <exploitdb>18987</exploitdb>
<exploitdb>23651</exploitdb> <exploitdb>23651</exploitdb>
@@ -1811,16 +1804,20 @@
<vulnerability> <vulnerability>
<title>WP Easy Gallery &lt;= 1.7 - Cross Site Scripting</title> <title>WP Easy Gallery &lt;= 1.7 - Cross Site Scripting</title>
<references> <references>
<secunia>49190</secunia>
<url>http://packetstormsecurity.com/files/112687/</url> <url>http://packetstormsecurity.com/files/112687/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>2.7.3</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>WP Easy Gallery &lt;= 2.7 - CSRF</title> <title>WP Easy Gallery &lt;= 2.7 - CSRF</title>
<references> <references>
<secunia>49190</secunia>
<url>http://plugins.trac.wordpress.org/changeset?reponame=&amp;old=669527%40wp-easy-gallery&amp;new=669527%40wp-easy-gallery</url> <url>http://plugins.trac.wordpress.org/changeset?reponame=&amp;old=669527%40wp-easy-gallery&amp;new=669527%40wp-easy-gallery</url>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>2.7.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -1828,9 +1825,11 @@
<vulnerability> <vulnerability>
<title>Subscribe2 &lt;= 8.0 - Cross Site Scripting</title> <title>Subscribe2 &lt;= 8.0 - Cross Site Scripting</title>
<references> <references>
<secunia>49189</secunia>
<url>http://packetstormsecurity.com/files/112688/</url> <url>http://packetstormsecurity.com/files/112688/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>8.1</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -1838,6 +1837,7 @@
<vulnerability> <vulnerability>
<title>Soundcloud Is Gold &lt;= 2.1 - Cross Site Scripting</title> <title>Soundcloud Is Gold &lt;= 2.1 - Cross Site Scripting</title>
<references> <references>
<secunia>49188</secunia>
<url>http://packetstormsecurity.com/files/112689/</url> <url>http://packetstormsecurity.com/files/112689/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -1920,9 +1920,11 @@
<vulnerability> <vulnerability>
<title>Newsletter Manager &lt;= 1.0 - Cross Site Scripting</title> <title>Newsletter Manager &lt;= 1.0 - Cross Site Scripting</title>
<references> <references>
<secunia>49183</secunia>
<url>http://packetstormsecurity.com/files/112694/</url> <url>http://packetstormsecurity.com/files/112694/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>1.0.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -2049,11 +2051,13 @@
<plugin name="codestyling-localization"> <plugin name="codestyling-localization">
<vulnerability> <vulnerability>
<title>Code Styling Localization &lt;= 1.99.16 - Cross Site Scripting</title> <title>Code Styling Localization &lt;= 1.99.17 - Cross Site Scripting</title>
<references> <references>
<secunia>49037</secunia>
<url>http://packetstormsecurity.com/files/112709/</url> <url>http://packetstormsecurity.com/files/112709/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>1.99.20</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -2150,9 +2154,11 @@
<vulnerability> <vulnerability>
<title>2-Click-Socialmedia-Buttons &lt;= 0.32.2 - Cross Site Scripting</title> <title>2-Click-Socialmedia-Buttons &lt;= 0.32.2 - Cross Site Scripting</title>
<references> <references>
<secunia>49181</secunia>
<url>http://packetstormsecurity.com/files/112711/</url> <url>http://packetstormsecurity.com/files/112711/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>0.35</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -2386,7 +2392,7 @@
<vulnerability> <vulnerability>
<title>WP Cycle Playlist - Multiple Vulnerabilities</title> <title>WP Cycle Playlist - Multiple Vulnerabilities</title>
<references> <references>
<url>http://1337day.com/exploits/17396</url> <url>http://1337day.com/exploit/17396</url>
</references> </references>
<type>MULTI</type> <type>MULTI</type>
</vulnerability> </vulnerability>
@@ -2455,7 +2461,7 @@
<vulnerability> <vulnerability>
<title>WP-AutoYoutube &lt;= 0.1 - Blind SQL Injection Vulnerability</title> <title>WP-AutoYoutube &lt;= 0.1 - Blind SQL Injection Vulnerability</title>
<references> <references>
<url>http://1337day.com/exploits/17368</url> <url>http://1337day.com/exploit/17368</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -2738,7 +2744,7 @@
<plugin name="is-human"> <plugin name="is-human">
<vulnerability> <vulnerability>
<title>Is-human &lt;=1.4.2 - Remote Command Execution Vulnerability</title> <title>Is-human &lt;= 1.4.2 - Remote Command Execution Vulnerability</title>
<references> <references>
<exploitdb>17299</exploitdb> <exploitdb>17299</exploitdb>
</references> </references>
@@ -3015,16 +3021,41 @@
<vulnerability> <vulnerability>
<title>Mingle Forum &lt;= 1.0.33 - Cross Site Scripting</title> <title>Mingle Forum &lt;= 1.0.33 - Cross Site Scripting</title>
<references> <references>
<secunia>49171</secunia>
<url>http://packetstormsecurity.com/files/112696/</url> <url>http://packetstormsecurity.com/files/112696/</url>
</references> </references>
<type>MULTI</type> <type>XSS</type>
<fixed_in>1.0.33.2</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Mingle Forum 1.0.33.3 - Multiple Parameter SQL Injection</title> <title>Mingle Forum 1.0.33.3 - fs-admin.php togroupusers Parameter XSS</title>
<references>
<osvdb>90432</osvdb>
<cve>2013-0734</cve>
<secunia>52167</secunia>
</references>
<type>XSS</type>
<fixed_in>1.0.34</fixed_in>
</vulnerability>
<vulnerability>
<title>Mingle Forum 1.0.33.3 - wpf.class.php search_words Parameter XSS</title>
<references>
<osvdb>90433</osvdb>
<cve>2013-0734</cve>
<secunia>52167</secunia>
</references>
<type>XSS</type>
<fixed_in>1.0.34</fixed_in>
</vulnerability>
<vulnerability>
<title>Mingle Forum 1.0.33.3 - wpf.class.php Multiple Parameter SQL Injection</title>
<references> <references>
<osvdb>90434</osvdb> <osvdb>90434</osvdb>
<cve>2013-0735</cve>
<secunia>52167</secunia>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
<fixed_in>1.0.34</fixed_in>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>Mingle Forum 1.0.35 - Privilege Escalation CSRF</title> <title>Mingle Forum 1.0.35 - Privilege Escalation CSRF</title>
@@ -4567,9 +4598,7 @@
<references> <references>
<url>http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/</url> <url>http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/</url>
<url>http://wordpress.org/support/topic/pwn3d</url> <url>http://wordpress.org/support/topic/pwn3d</url>
<url> <url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
</url>
<metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit> <metasploit>exploits/unix/webapp/php_wordpress_total_cache</metasploit>
</references> </references>
<type>RCE</type> <type>RCE</type>
@@ -4588,13 +4617,11 @@
<plugin name="wp-super-cache"> <plugin name="wp-super-cache">
<vulnerability> <vulnerability>
<title>WP-Super-Cache - Remote Code Execution</title> <title>WP-Super-Cache 1.3 - Remote Code Execution</title>
<references> <references>
<url>http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/</url> <url>http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/</url>
<url>http://wordpress.org/support/topic/pwn3d</url> <url>http://wordpress.org/support/topic/pwn3d</url>
<url> <url>http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html</url>
http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html
</url>
</references> </references>
<type>RCE</type> <type>RCE</type>
<fixed_in>1.3.1</fixed_in> <fixed_in>1.3.1</fixed_in>
@@ -4642,7 +4669,7 @@
<title>ipfeuilledechou - SQL Injection Vulnerability</title> <title>ipfeuilledechou - SQL Injection Vulnerability</title>
<references> <references>
<url>http://www.exploit4arab.com/exploits/377</url> <url>http://www.exploit4arab.com/exploits/377</url>
<url>http://1337day.com/exploits/20206</url> <url>http://1337day.com/exploit/20206</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -4749,7 +4776,7 @@
<title>Developer Formatter - CSRF and XSS Vulnerability</title> <title>Developer Formatter - CSRF and XSS Vulnerability</title>
<references> <references>
<url>http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txt</url> <url>http://illsecure.com/code/Wordpress-DevFormatter-CSRF-Vulnerability.txt</url>
<url>http://1337day.com/exploits/20210</url> <url>http://1337day.com/exploit/20210</url>
<secunia>51912</secunia> <secunia>51912</secunia>
</references> </references>
<type>MULTI</type> <type>MULTI</type>
@@ -5277,7 +5304,7 @@
<vulnerability> <vulnerability>
<title>wp-explorer-gallery - Arbitrary File Upload Vulnerability</title> <title>wp-explorer-gallery - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20251</url> <url>http://1337day.com/exploit/20251</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -5287,7 +5314,7 @@
<vulnerability> <vulnerability>
<title>accordion - Arbitrary File Upload Vulnerability</title> <title>accordion - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20254</url> <url>http://1337day.com/exploit/20254</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -5297,7 +5324,7 @@
<vulnerability> <vulnerability>
<title>wp-catpro - Arbitrary File Upload Vulnerability</title> <title>wp-catpro - Arbitrary File Upload Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20256</url> <url>http://1337day.com/exploit/20256</url>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -5350,7 +5377,7 @@
<vulnerability> <vulnerability>
<title>p1m media manager - SQL Injection Vulnerability</title> <title>p1m media manager - SQL Injection Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20270</url> <url>http://1337day.com/exploit/20270</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -5390,7 +5417,7 @@
<vulnerability> <vulnerability>
<title>ForumConverter - SQL Injection Vulnerability</title> <title>ForumConverter - SQL Injection Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20275</url> <url>http://1337day.com/exploit/20275</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -5400,7 +5427,7 @@
<vulnerability> <vulnerability>
<title>Newsletter - SQL Injection Vulnerability</title> <title>Newsletter - SQL Injection Vulnerability</title>
<references> <references>
<url>http://www.1337day.com/exploit/20287</url> <url>http://1337day.com/exploit/20287</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -5520,7 +5547,7 @@
<vulnerability> <vulnerability>
<title>Google Alert And Twitter 3.1.5 - XSS Exploit, SQL Injection</title> <title>Google Alert And Twitter 3.1.5 - XSS Exploit, SQL Injection</title>
<references> <references>
<url>http://1337day.com/exploits/20433</url> <url>http://1337day.com/exploit/20433</url>
</references> </references>
<type>MULTI</type> <type>MULTI</type>
</vulnerability> </vulnerability>
@@ -5860,8 +5887,10 @@
<plugin name="terillion-reviews"> <plugin name="terillion-reviews">
<vulnerability> <vulnerability>
<title>Terillion Reviews - Cross Site Scripting</title> <title>Terillion Reviews - Profile Id Field XSS</title>
<references> <references>
<osvdb>91123</osvdb>
<cve>2013-1201</cve>
<url>http://packetstormsecurity.com/files/120730/</url> <url>http://packetstormsecurity.com/files/120730/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -5938,8 +5967,7 @@
<title>WP-Banners-Lite - XSS vulnerability</title> <title>WP-Banners-Lite - XSS vulnerability</title>
<references> <references>
<url>http://seclists.org/fulldisclosure/2013/Mar/209</url> <url>http://seclists.org/fulldisclosure/2013/Mar/209</url>
<url>http://threatpost.com/en_us/blogs/xss-flaw-wordpress-plugin-allows-injection-malicious-code-032513 <url>http://threatpost.com/en_us/blogs/xss-flaw-wordpress-plugin-allows-injection-malicious-code-032513</url>
</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
@@ -5974,6 +6002,7 @@
<title>chikuncount - ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>chikuncount - ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<references> <references>
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -5986,6 +6015,7 @@
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<secunia>37903</secunia> <secunia>37903</secunia>
<cve>2009-4140</cve> <cve>2009-4140</cve>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
<fixed_in>0.5</fixed_in> <fixed_in>0.5</fixed_in>
@@ -5997,6 +6027,7 @@
<title>spamtask - ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>spamtask - ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<references> <references>
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -6007,6 +6038,7 @@
<title>php-analytics - ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>php-analytics - ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<references> <references>
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -6017,6 +6049,7 @@
<title>seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<references> <references>
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -6027,6 +6060,7 @@
<title>wp-seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>wp-seo-spy-google - ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<references> <references>
<exploitdb>24492</exploitdb> <exploitdb>24492</exploitdb>
<metasploit>exploit/unix/webapp/open_flash_chart_upload_exec</metasploit>
</references> </references>
<type>UPLOAD</type> <type>UPLOAD</type>
</vulnerability> </vulnerability>
@@ -6282,8 +6316,10 @@
<plugin name="related-posts-by-zemanta"> <plugin name="related-posts-by-zemanta">
<vulnerability> <vulnerability>
<title>Related Posts by Zemanta - Cross-Site Request Forgery Vulnerability</title> <title>Related Posts by Zemanta 1.3.1 - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<osvdb>93364</osvdb>
<cve>2013-3477</cve>
<secunia>53321</secunia> <secunia>53321</secunia>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
@@ -6293,19 +6329,22 @@
<plugin name="wordpress-23-related-posts-plugin"> <plugin name="wordpress-23-related-posts-plugin">
<vulnerability> <vulnerability>
<title>WordPress Related Posts - Cross-Site Request Forgery Vulnerability</title> <title>WordPress Related Posts 2.6.1 - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<osvdb>93362</osvdb>
<cve>2013-3476</cve>
<secunia>53279</secunia> <secunia>53279</secunia>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>2.6.2</fixed_in> <fixed_in>2.7.2</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="related-posts"> <plugin name="related-posts">
<vulnerability> <vulnerability>
<title>Related Posts - Cross-Site Request Forgery Vulnerability</title> <title>Related Posts 2.7.1 - Cross-Site Request Forgery Vulnerability</title>
<references> <references>
<osvdb>93363</osvdb>
<secunia>53122</secunia> <secunia>53122</secunia>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
@@ -6315,7 +6354,7 @@
<plugin name="wp-print-friendly"> <plugin name="wp-print-friendly">
<vulnerability> <vulnerability>
<title>WP Print Friendly &lt;=0.5.2 - Security Bypass Vulnerability</title> <title>WP Print Friendly &lt;= 0.5.2 - Security Bypass Vulnerability</title>
<references> <references>
<osvdb>93243</osvdb> <osvdb>93243</osvdb>
<secunia>53371</secunia> <secunia>53371</secunia>
@@ -6418,12 +6457,14 @@
<plugin name="funcaptcha"> <plugin name="funcaptcha">
<vulnerability> <vulnerability>
<title>FunCaptcha - CSRF</title> <title>FunCaptcha 0.3.2- Setting Manipulation CSRF</title>
<references> <references>
<osvdb>92272</osvdb>
<secunia>53021</secunia>
<url>http://wordpress.org/extend/plugins/funcaptcha/changelog/</url> <url>http://wordpress.org/extend/plugins/funcaptcha/changelog/</url>
</references> </references>
<type>UNKNOWN</type> <type>CSRF</type>
<fixed_in>0.33</fixed_in> <fixed_in>0.3.3</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -6679,6 +6720,7 @@
<vulnerability> <vulnerability>
<title>Xorbin Digital Flash Clock 1.0 - Flash-based XSS</title> <title>Xorbin Digital Flash Clock 1.0 - Flash-based XSS</title>
<references> <references>
<url>http://packetstormsecurity.com/files/122223/</url>
<url>http://advisory.prakharprasad.com/xorbin_dfc_wp.txt</url> <url>http://advisory.prakharprasad.com/xorbin_dfc_wp.txt</url>
<cve>2013-4693</cve> <cve>2013-4693</cve>
</references> </references>
@@ -6756,6 +6798,7 @@
<references> <references>
<osvdb>95557</osvdb> <osvdb>95557</osvdb>
<exploitdb>26804</exploitdb> <exploitdb>26804</exploitdb>
<url>http://packetstormsecurity.com/files/122396/</url>
</references> </references>
<type>RFI</type> <type>RFI</type>
</vulnerability> </vulnerability>
@@ -7080,7 +7123,7 @@
<plugin name="lbg_zoominoutslider"> <plugin name="lbg_zoominoutslider">
<vulnerability> <vulnerability>
<title>LBG Zoominoutslider - XSS Vulnerability</title> <title>LBG Zoominoutslider - add_banner.php name Parameter Stored XSS</title>
<references> <references>
<osvdb>97887</osvdb> <osvdb>97887</osvdb>
<secunia>54983</secunia> <secunia>54983</secunia>
@@ -7088,6 +7131,32 @@
</references> </references>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability>
<title>LBG Zoominoutslider - settings_form.php Multiple Parameter Stored XSS</title>
<references>
<osvdb>99339</osvdb>
<url>http://packetstormsecurity.com/files/123914/</url>
<url>http://seclists.org/fulldisclosure/2013/Nov/30</url>
</references>
<type>XSS</type>
</vulnerability>
<vulnerability>
<title>LBG Zoominoutslider - add_playlist_record.php Multiple Parameter Stored XSS</title>
<references>
<osvdb>99340</osvdb>
<url>http://packetstormsecurity.com/files/123914/</url>
<url>http://seclists.org/fulldisclosure/2013/Nov/30</url>
</references>
<type>XSS</type>
</vulnerability>
<vulnerability>
<title>LBG Zoominoutslider - Multiple Script Direct Request Path Disclosure</title>
<references>
<osvdb>99341</osvdb>
<url>http://seclists.org/fulldisclosure/2013/Nov/30</url>
</references>
<type>FPD</type>
</vulnerability>
</plugin> </plugin>
<plugin name="woopra"> <plugin name="woopra">
@@ -7206,8 +7275,10 @@
<vulnerability> <vulnerability>
<title>Booking Calendar 4.1.4 - CSRF Vulnerability</title> <title>Booking Calendar 4.1.4 - CSRF Vulnerability</title>
<references> <references>
<exploitdb>27399</exploitdb>
<osvdb>96088</osvdb> <osvdb>96088</osvdb>
<exploitdb>27399</exploitdb>
<secunia>54461</secunia>
<url>http://packetstormsecurity.com/files/122691/</url>
<url>http://wpbookingcalendar.com/</url> <url>http://wpbookingcalendar.com/</url>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
@@ -7233,10 +7304,12 @@
<references> <references>
<osvdb>98279</osvdb> <osvdb>98279</osvdb>
<exploitdb>28808</exploitdb> <exploitdb>28808</exploitdb>
<secunia>55172</secunia>
<url>http://packetstormsecurity.com/files/123549/</url> <url>http://packetstormsecurity.com/files/123549/</url>
<url>http://quick-plugins.com/quick-contact-form/</url> <url>http://quick-plugins.com/quick-contact-form/</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
<fixed_in>6.1</fixed_in>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -7531,6 +7604,7 @@
<osvdb>98668</osvdb> <osvdb>98668</osvdb>
<secunia>55296</secunia> <secunia>55296</secunia>
<exploitdb>28970</exploitdb> <exploitdb>28970</exploitdb>
<url>http://packetstormsecurity.com/files/123597/</url>
<url>http://www.securityfocus.com/bid/63021</url> <url>http://www.securityfocus.com/bid/63021</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -7569,6 +7643,7 @@
<title>Feed - news_dt.php nid Parameter SQL Injection</title> <title>Feed - news_dt.php nid Parameter SQL Injection</title>
<references> <references>
<osvdb>94804</osvdb> <osvdb>94804</osvdb>
<url>http://packetstormsecurity.com/files/122260/</url>
</references> </references>
<type>SQLI</type> <type>SQLI</type>
</vulnerability> </vulnerability>
@@ -7725,6 +7800,7 @@
<osvdb>98831</osvdb> <osvdb>98831</osvdb>
<cve>2013-6281</cve> <cve>2013-6281</cve>
<secunia>55396</secunia> <secunia>55396</secunia>
<url>http://packetstormsecurity.com/files/123699/</url>
<url>http://www.securityfocus.com/bid/63256</url> <url>http://www.securityfocus.com/bid/63256</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -7765,10 +7841,11 @@
<plugin name="gallery-bank"> <plugin name="gallery-bank">
<vulnerability> <vulnerability>
<title>Gallery Bank 2.0.19 - Multiple Unspecified XSS</title> <title>Gallery Bank 2.0.19 - edit-album.php album_id Parameter Reflected XSS</title>
<references> <references>
<osvdb>99045</osvdb> <osvdb>99045</osvdb>
<secunia>55443</secunia> <secunia>55443</secunia>
<url>http://packetstormsecurity.com/files/123924/</url>
<url>http://www.securityfocus.com/bid/63382</url> <url>http://www.securityfocus.com/bid/63382</url>
</references> </references>
<type>XSS</type> <type>XSS</type>
@@ -7784,6 +7861,17 @@
<type>UNKNOWN</type> <type>UNKNOWN</type>
<fixed_in>2.0.20</fixed_in> <fixed_in>2.0.20</fixed_in>
</vulnerability> </vulnerability>
<vulnerability>
<title>Gallery Bank 2.0.19 - album-gallery-bank-class.php recordsArray Parameter Reflected XSS</title>
<references>
<osvdb>99345</osvdb>
<secunia>55443</secunia>
<url>http://www.securityfocus.com/bid/63385</url>
<url>http://seclists.org/fulldisclosure/2013/Nov/38</url>
</references>
<type>XSS</type>
<fixed_in>2.0.20</fixed_in>
</vulnerability>
</plugin> </plugin>
<plugin name="rockhoist-ratings"> <plugin name="rockhoist-ratings">
@@ -7798,4 +7886,61 @@
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wordpress-checkout">
<vulnerability>
<title>Checkout Plugin - File Upload Remote Code Execution</title>
<references>
<osvdb>99225</osvdb>
<url>http://packetstormsecurity.com/files/123866/</url>
</references>
<type>RCE</type>
</vulnerability>
</plugin>
<plugin name="mobilechief-mobile-site-creator">
<vulnerability>
<title>MobileChief - jQuery Validation Cross-Site Scripting Vulnerability</title>
<references>
<secunia>55501</secunia>
<url>http://packetstormsecurity.com/files/123809/</url>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="timeline">
<vulnerability>
<title>Facebook Survey Pro - timeline/index.php id Parameter SQL Injection</title>
<references>
<secunia>87817</secunia>
<exploitdb>22853</exploitdb>
<url>http://packetstormsecurity.com/files/118238/</url>
<url>http://www.securityfocus.com/bid/56595</url>
<url>http://xforce.iss.net/xforce/xfdb/80141</url>
</references>
<type>SQLI</type>
</vulnerability>
</plugin>
<plugin name="live-comment-preview">
<vulnerability>
<title>Live Comment Preview 2.0.2 - Comment Field Preview XSS</title>
<references>
<osvdb>92944</osvdb>
</references>
<type>XSS</type>
</vulnerability>
</plugin>
<plugin name="polldaddy">
<vulnerability>
<title>Polldaddy Polls and Ratings 2.0.20 - Cross-Site Request Forgery Vulnerability</title>
<references>
<secunia>55464</secunia>
</references>
<type>CSRF</type>
<fixed_in>2.0.21</fixed_in>
</vulnerability>
</plugin>
</vulnerabilities> </vulnerabilities>

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -1827,6 +1827,7 @@
<osvdb>98927</osvdb> <osvdb>98927</osvdb>
<exploitdb>29068</exploitdb> <exploitdb>29068</exploitdb>
<url>http://www.securityfocus.com/bid/63306</url> <url>http://www.securityfocus.com/bid/63306</url>
<url>http://1337day.com/exploit/21442</url>
<url>http://themeforest.net/item/area53-a-responsive-html5-wordpress-theme/2538737</url> <url>http://themeforest.net/item/area53-a-responsive-html5-wordpress-theme/2538737</url>
</references> </references>
<type>RCE</type> <type>RCE</type>
@@ -1880,7 +1881,9 @@
<title>Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF</title> <title>Curvo - wp-content/themes/curvo/functions/upload-handler.php File Upload CSRF</title>
<references> <references>
<osvdb>99043</osvdb> <osvdb>99043</osvdb>
<exploitdb>29211</exploitdb>
<url>http://packetstormsecurity.com/files/123799/</url> <url>http://packetstormsecurity.com/files/123799/</url>
<url>http://packetstormsecurity.com/files/123820/</url>
</references> </references>
<type>CSRF</type> <type>CSRF</type>
</vulnerability> </vulnerability>
@@ -1897,4 +1900,118 @@
</vulnerability> </vulnerability>
</theme> </theme>
<theme name="saico">
<vulnerability>
<title>Saico - Arbitrary File Upload Vulnerability</title>
<references>
<exploitdb>29150</exploitdb>
<url>http://1337day.com/exploit/21440</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="ThisWay">
<vulnerability>
<title>ThisWay - remote shell upload vulnerability</title>
<references>
<url>http://packetstormsecurity.com/files/123895/</url>
</references>
<type>RCE</type>
</vulnerability>
</theme>
<theme name="ThinkResponsive">
<vulnerability>
<title>Think Responsive 1.0 - Arbitrary shell upload vulnerability</title>
<references>
<exploitdb>29332</exploitdb>
<url>http://packetstormsecurity.com/files/123880/</url>
</references>
<type>RCE</type>
</vulnerability>
</theme>
<theme name="anthology">
<vulnerability>
<title>Anthology - Remote File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21460</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="amoveo">
<vulnerability>
<title>Amoveo - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21451</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="switchblade">
<vulnerability>
<title>Switchblade 1.3 - Arbitrary File Upload Vulnerability</title>
<references>
<osvdb>88918</osvdb>
<exploitdb>29330</exploitdb>
<url>http://1337day.com/exploit/21457</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="magnitudo">
<vulnerability>
<title>Magnitudo - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21457</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="ghost">
<vulnerability>
<title>Ghost - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21416</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="RightNow">
<vulnerability>
<title>Right Now - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21420</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="ColdFusion">
<vulnerability>
<title>Cold Fusion - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21431</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
<theme name="chameleon">
<vulnerability>
<title>Chameleon - Arbitrary File Upload Vulnerability</title>
<references>
<url>http://1337day.com/exploit/21449</url>
</references>
<type>UPLOAD</type>
</vulnerability>
</theme>
</vulnerabilities> </vulnerabilities>

File diff suppressed because it is too large Load Diff

View File

@@ -24,6 +24,7 @@
2010-translucence-parent 2010-translucence-parent
2010-weaver 2010-weaver
2012-xtended 2012-xtended
2013-black-and-white
2013-blue 2013-blue
22nd-july 22nd-july
25th-week 25th-week
@@ -33,11 +34,13 @@
30-basics 30-basics
31three 31three
3366 3366
350-media
360theme 360theme
3col-rdmban-lr 3col-rdmban-lr
3col-rdmban-rr 3col-rdmban-rr
3colours 3colours
3d-realty 3d-realty
3star-theme
42k 42k
42walls 42walls
4colourslover 4colourslover
@@ -58,6 +61,7 @@
8press 8press
8q 8q
8some 8some
8squares
8templates_city_green 8templates_city_green
8templates_city_orange 8templates_city_orange
8templates_city_pink 8templates_city_pink
@@ -208,6 +212,7 @@ alba
albinomouse albinomouse
albizia albizia
alce alce
aldehyde
aldus aldus
alex-and-anthonys-halloween alex-and-anthonys-halloween
alex-crunch-lite alex-crunch-lite
@@ -247,6 +252,7 @@ alowa
alpen alpen
alpen3col alpen3col
alpha alpha
alpha-source
alphastrap alphastrap
alphatr alphatr
alpine alpine
@@ -291,7 +297,9 @@ anacronico-uri-httpanacroniconet63netblog
anakin-mobile anakin-mobile
analytical-lite analytical-lite
anand anand
anarcho-notepad
anatomy-lite anatomy-lite
anchor
andclean andclean
andoru andoru
andrea andrea
@@ -528,8 +536,10 @@ bandana
bandtheme bandtheme
bangasd bangasd
bangkok1 bangkok1
banten-it
baobab baobab
barbara barbara
barber
barcelona barcelona
barclays barclays
bare bare
@@ -567,6 +577,7 @@ baw-black-and-white
baza-noclegowa baza-noclegowa
bba bba
bbcc-theme bbcc-theme
bbpress-and-canvas-fix-canvas-child-theme
bbpress-twenty-ten bbpress-twenty-ten
bbtemplate-1 bbtemplate-1
bbtemplate-2 bbtemplate-2
@@ -580,6 +591,7 @@ beach-evening
beach-holiday beach-holiday
beach-holidays beach-holidays
beach-vacation beach-vacation
bearded
bearded-llama bearded-llama
beardsley beardsley
beautiful-decay beautiful-decay
@@ -666,6 +678,7 @@ biznez-lite
bizstudio-lite bizstudio-lite
biztheme biztheme
bizvektor bizvektor
bizvektor-global-edition
bizway bizway
bizway-responsive bizway-responsive
bizz-trip bizz-trip
@@ -762,8 +775,10 @@ blacky-right-sidebar
blackypress blackypress
blackzebra blackzebra
blagz-blog-magazine-theme blagz-blog-magazine-theme
blain
blank blank
blank-page blank-page
blank-theme
blankpress blankpress
blankslate blankslate
blas-blogger blas-blogger
@@ -1013,6 +1028,7 @@ boathouse2
bobs-law-blog bobs-law-blog
bodhi bodhi
bodrum-theme bodrum-theme
bodyhealth
bogeygolfer bogeygolfer
boil-bauble boil-bauble
boilerplate boilerplate
@@ -1133,6 +1149,7 @@ buddypress-x-facebook
buddytheme buddytheme
bude-rocks-theme bude-rocks-theme
budzmodo budzmodo
bueno
bufa bufa
bugbudge bugbudge
build build
@@ -1166,6 +1183,7 @@ business-vision
business-woman-top business-woman-top
business_blog business_blog
businessfirst businessfirst
businessgrow
businessidea businessidea
businessman-pro businessman-pro
businesspress businesspress
@@ -1176,6 +1194,7 @@ businessxpand_multicol
businessxpand_tentacle businessxpand_tentacle
businessxpand_twieme businessxpand_twieme
businessxpand_viewer_v2 businessxpand_viewer_v2
busiprof
butcher-block butcher-block
butter-scotch butter-scotch
buttercream buttercream
@@ -1203,8 +1222,10 @@ cakifo
call-power call-power
callas callas
calleiro calleiro
callisto
calotropis calotropis
cameo cameo
camille-vencert
cammino cammino
canddblog canddblog
candid candid
@@ -1290,6 +1311,7 @@ change-it
changeable changeable
chaostheory chaostheory
chaoticsoul chaoticsoul
chapparal-business-template
charactertheme charactertheme
charcoal charcoal
charcoal-v1 charcoal-v1
@@ -1322,6 +1344,7 @@ chiron
chloe chloe
chocolate chocolate
chocolate-lite chocolate-lite
chocolate-shoppe
chocolate-theme-pedro-amigo-mio chocolate-theme-pedro-amigo-mio
chocotheme chocotheme
chooko-lite chooko-lite
@@ -1344,7 +1367,9 @@ chun
chuncss chuncss
chunk chunk
chunky chunky
church
circles circles
cirkle
cirque cirque
cisco cisco
citizen-journal citizen-journal
@@ -1380,6 +1405,7 @@ clean-and-clear
clean-and-plain clean-and-plain
clean-and-red clean-and-red
clean-and-simple clean-and-simple
clean-black
clean-blue clean-blue
clean-blue-vision clean-blue-vision
clean-dirt clean-dirt
@@ -1497,9 +1523,11 @@ codescheme_blue
codicolorz codicolorz
codium codium
codium-extend codium-extend
codium-grid
cody cody
cody-theme cody-theme
coffee coffee
coffee-break-theme
coffee-cup coffee-cup
coffee-desk coffee-desk
coffee-lite coffee-lite
@@ -1677,6 +1705,7 @@ creative-mag
creative-simplicity creative-simplicity
creativemag creativemag
crimson crimson
crimson-lite
crimsonsky crimsonsky
cris cris
crisp crisp
@@ -1729,6 +1758,7 @@ custom-theme
customclean customclean
customfolio customfolio
customizr customizr
customizr123
cute-bubbles cute-bubbles
cute-frames cute-frames
cute-theme cute-theme
@@ -1747,6 +1777,7 @@ cyanus-theme
cyberchimps cyberchimps
cyberchimps-free cyberchimps-free
cyclo cyclo
cycnus
cypee-red cypee-red
d-basic d-basic
d-simpel d-simpel
@@ -1878,8 +1909,10 @@ delicate-theme
delicato delicato
delice delice
delight delight
delighted
deliverance-gray-blog deliverance-gray-blog
dellistore dellistore
dellow
delphi delphi
demar demar
demiloo demiloo
@@ -1894,6 +1927,7 @@ depescatore-theme
depo-masthead depo-masthead
depo-square depo-square
depo-square-revisited depo-square-revisited
deposito
derker derker
desaindigital desaindigital
descartes descartes
@@ -1922,6 +1956,7 @@ deuterium
deux-milles-douze deux-milles-douze
devart devart
devart123 devart123
devdmbootstrap3
developer developer
devita devita
devolution devolution
@@ -2036,6 +2071,7 @@ dramatica
drawlin drawlin
dream-in-infrared dream-in-infrared
dream-sky dream-sky
dreambank
dreamline dreamline
dreamnix dreamnix
dreamplace dreamplace
@@ -2111,6 +2147,7 @@ eco-world
eco_house eco_house
ecogreen ecogreen
ecologist ecologist
ecommerce
economist economist
ecowp ecowp
ectopudding ectopudding
@@ -2246,6 +2283,7 @@ evening-shade
evening-sun evening-sun
eventide eventide
ever-after ever-after
ever-green
ever-watchful ever-watchful
everg33n everg33n
evilpuzzle evilpuzzle
@@ -2401,6 +2439,7 @@ fitzgerald
fivecast fivecast
fiver fiver
fixed-blix fixed-blix
fixy
flashcast flashcast
flashy flashy
flat-portfolio flat-portfolio
@@ -2530,9 +2569,11 @@ fresh
fresh-blog fresh-blog
fresh-blu fresh-blu
fresh-editorial fresh-editorial
fresh-free
fresh-ideas fresh-ideas
fresh-ink-magazine fresh-ink-magazine
fresh-lime fresh-lime
fresh-lite
fresh-magazine fresh-magazine
fresh-mint-delight fresh-mint-delight
fresh-style fresh-style
@@ -2638,6 +2679,7 @@ geospehre
geosphere geosphere
german-newspaper german-newspaper
gerro-post-lime gerro-post-lime
get-masum
get-some get-some
getaway-graphics getaway-graphics
getfreewallpapers getfreewallpapers
@@ -2823,6 +2865,7 @@ greenmag
greenmag_extend greenmag_extend
greenotation greenotation
greenpaddy greenpaddy
greenpage
greenpoint-milanda greenpoint-milanda
greensplash-2-classic greensplash-2-classic
greensplash-classic greensplash-classic
@@ -2914,6 +2957,7 @@ hanami
hanamoto hanamoto
hananews hananews
hanging hanging
hannari
happily-ever-after happily-ever-after
happy-cork-board happy-cork-board
happy-cyclope happy-cyclope
@@ -3046,6 +3090,7 @@ huan
huaqian huaqian
hue-clash-in-harmony hue-clash-in-harmony
hued hued
hueman
hum hum
human3rror human3rror
humanities humanities
@@ -3225,6 +3270,7 @@ internet-center-3-columns
internet-music internet-music
internet-music-3-columns internet-music-3-columns
internet-sharing internet-sharing
inthedistance
intrepid intrepid
intrepidity intrepidity
introvert introvert
@@ -3467,6 +3513,7 @@ kolkata-knight-riders-goldenblack-theme
kolorful kolorful
kolorful-wordpress-theme kolorful-wordpress-theme
kom2-theme kom2-theme
komachi
kombinat-eins kombinat-eins
kombinat-zwo kombinat-zwo
konax-for-buddypress konax-for-buddypress
@@ -3514,6 +3561,7 @@ lakeside
lalala lalala
laloo laloo
lambda lambda
lamya
landline landline
landscape landscape
landscape-gallery landscape-gallery
@@ -3650,6 +3698,7 @@ listthis
liteblue liteblue
liten liten
litepress litepress
litesta
litethoughts litethoughts
littera-theme littera-theme
little little
@@ -3752,6 +3801,7 @@ madmens-blog
mag mag
magatheme magatheme
magatheme-html5 magatheme-html5
magazine
magazine-basic magazine-basic
magazine-drome magazine-drome
magazine-pro magazine-pro
@@ -3860,6 +3910,7 @@ mbresets-lite
mc-responsive mc-responsive
mc-twitterbootstrap mc-twitterbootstrap
mcg-theme mcg-theme
mckinley
me3 me3
mead mead
meadowland meadowland
@@ -3904,6 +3955,7 @@ merry-christmas
mes-vacances-french mes-vacances-french
mesocolumn mesocolumn
mess-desk-v2 mess-desk-v2
messenger
metamarfosa metamarfosa
metamorph_blue metamorph_blue
metamorph_dao metamorph_dao
@@ -4055,6 +4107,7 @@ mmorpg-games
mnml mnml
mnmlblog mnmlblog
mnmltheme mnmltheme
mobile
mobile-minimalist mobile-minimalist
mobilephonecomparision mobilephonecomparision
mobilescope mobilescope
@@ -4068,6 +4121,7 @@ modern-blue
modern-blue-dark modern-blue-dark
modern-blue-style modern-blue-style
modern-clix modern-clix
modern-estate
modern-furniture modern-furniture
modern-girl modern-girl
modern-green modern-green
@@ -4075,6 +4129,7 @@ modern-green-theme
modern-minimalist modern-minimalist
modern-multipurpose modern-multipurpose
modern-notepad modern-notepad
modern-real-estate
modern-remix modern-remix
modern-style modern-style
modern-theme modern-theme
@@ -4128,6 +4183,7 @@ moony
more-or-less more-or-less
morning-coffee morning-coffee
morning-mai-like morning-mai-like
morphic
mortaroo mortaroo
mortgage mortgage
mortgages mortgages
@@ -4140,6 +4196,7 @@ moulin-whoosh
mountain mountain
mountain-biking-sports-pro-theme mountain-biking-sports-pro-theme
mountain-climbing mountain-climbing
mountain-creek
mountain-dawn mountain-dawn
mouse-it mouse-it
mouseover-blue mouseover-blue
@@ -4342,6 +4399,7 @@ neutra
neutral neutral
neutral-mono-labver neutral-mono-labver
neutralis neutralis
neutro
neverballium neverballium
new-arabic-theme new-arabic-theme
new-balance-of-blue new-balance-of-blue
@@ -4400,6 +4458,8 @@ nice_wee_theme
nicecol nicecol
nicely-done nicely-done
nicey nicey
nichiboard
nictitate-free
nifty nifty
night night
night-circles night-circles
@@ -4493,6 +4553,7 @@ office
officefolders officefolders
offset-writing offset-writing
oh oh
ohands
okidoki okidoki
old-book old-book
old-japan old-japan
@@ -4513,6 +4574,7 @@ omega
omega-child omega-child
omegab omegab
omegag omegag
omegatheme
omegax omegax
omicron omicron
omni-theme-clone omni-theme-clone
@@ -4523,11 +4585,13 @@ one
one-day-at-a-time one-day-at-a-time
one-fine-day one-fine-day
one-night-in-paris one-night-in-paris
one-page
one-page-parallax one-page-parallax
one-pager one-pager
one-simplemagazine one-simplemagazine
one-winged-angel one-winged-angel
onec onec
onecolumn
onel onel
onenews-basic onenews-basic
onepress-framework onepress-framework
@@ -4545,6 +4609,7 @@ ontaheen
onyx onyx
ooble ooble
open-blue-sky open-blue-sky
open-pages
open-sourcerer open-sourcerer
openair openair
openark-blog openark-blog
@@ -4653,6 +4718,7 @@ p2-pro
p2-red p2-red
p2lysa p2lysa
p2v1 p2v1
p3
paakbook-buddypress-buddypack paakbook-buddypress-buddypack
pabooktlx pabooktlx
pachyderm pachyderm
@@ -4945,6 +5011,7 @@ premium-orange
premium-photoblog premium-photoblog
premium-photoblog-uriwwwgoogleca premium-photoblog-uriwwwgoogleca
premium-violet premium-violet
premium-wp-blog
prequel prequel
present present
press3 press3
@@ -4994,6 +5061,7 @@ projectcthroo
prologic prologic
prologue prologue
promag promag
promax
pronto pronto
property-theme property-theme
propress propress
@@ -5026,6 +5094,7 @@ pupul
pupulsky pupulsky
pure pure
pure-cloud pure-cloud
pure-color
pure-ii pure-ii
pure-line pure-line
pure-sky pure-sky
@@ -5156,6 +5225,7 @@ red-christmas
red-city red-city
red-corner red-corner
red-couch red-couch
red-dead-redemption
red-delicious red-delicious
red-diva red-diva
red-dodge red-dodge
@@ -5238,6 +5308,7 @@ reposter
required required
reruns reruns
resimit-colors resimit-colors
respare
respect respect
respon respon
response response
@@ -5310,6 +5381,7 @@ riverside
rizwan rizwan
rizwan-137 rizwan-137
road-fighter road-fighter
robbertooo78
robia robia
robo-basic robo-basic
rock-solid rock-solid
@@ -5489,6 +5561,7 @@ semrawang
senar1st-ten senar1st-ten
sense-and-sensibility-bp sense-and-sensibility-bp
sensei sensei
sensilla
sensitive sensitive
sensitivesayan sensitivesayan
seo-basics seo-basics
@@ -5504,6 +5577,7 @@ sepia
serena serena
serendib serendib
serene serene
serene-elegant-free
serenity serenity
serenity-orange serenity-orange
serious-blogger serious-blogger
@@ -5563,11 +5637,13 @@ shoestrap
shoot-it shoot-it
shop shop
shop-front shop-front
shopping
shortcoded shortcoded
showcase showcase
showkaase showkaase
showy showy
shprink-one shprink-one
shpsmedia
shreddyblog shreddyblog
shsummer shsummer
shufflemix shufflemix
@@ -5623,6 +5699,7 @@ simple-catch
simple-china simple-china
simple-chrome simple-chrome
simple-circle simple-circle
simple-classic
simple-community simple-community
simple-dark-theme simple-dark-theme
simple-dia simple-dia
@@ -5761,6 +5838,7 @@ simplymajestic
simplypink simplypink
simpo simpo
simpsons-donut simpsons-donut
simvance
sing-song sing-song
singlebot singlebot
singsong singsong
@@ -6075,7 +6153,9 @@ strikeball-counterstrike
striker striker
strikkemakeriet strikkemakeriet
stripay stripay
striped
striped-blog striped-blog
striped-by-donmik
stripedblog stripedblog
stripefolio stripefolio
stripes stripes
@@ -6104,6 +6184,7 @@ stylish
stylish-blue stylish-blue
stylish-deco stylish-deco
stylish-home-deco stylish-home-deco
stylize
stylized-piano-black stylized-piano-black
subar-rum subar-rum
sublime sublime
@@ -6117,6 +6198,7 @@ subtly-stripe-ed
sucha sucha
suevafree suevafree
suffusion suffusion
suits
sukelius-magazine sukelius-magazine
summ summ
summer summer
@@ -6242,6 +6324,7 @@ tdtasko
tdvoice tdvoice
teak teak
teal teal
teamraxy
teamspirit teamspirit
teamwork teamwork
teatrale teatrale
@@ -6361,6 +6444,7 @@ the-maleo
the-marketing-theme the-marketing-theme
the-mighty-moo the-mighty-moo
the-minimalist the-minimalist
the-newswire
the-next-lvl the-next-lvl
the-nice-one the-nice-one
the-night-watch the-night-watch
@@ -6368,6 +6452,7 @@ the-other-blog-lite-red
the-pinata the-pinata
the-power-of-the-water the-power-of-the-water
the-premium-magazine-wordpress-theme the-premium-magazine-wordpress-theme
the-professional
the-real-blank-page the-real-blank-page
the-real-blank-theme the-real-blank-theme
the-rust the-rust
@@ -6469,6 +6554,7 @@ timecafe-free-theme-1
timecrunch timecrunch
timeless timeless
timeline timeline
timeturner
timmmmmmmmmm timmmmmmmmmm
timtamland timtamland
tinland tinland
@@ -6548,6 +6634,7 @@ travel-blogger-new-yorker
travel-blogger-passport travel-blogger-passport
travel-blogger-streets travel-blogger-streets
travel-club travel-club
travel-in-italy
travel-in-love travel-in-love
travel-inspired travel-inspired
travel-is-my-life travel-is-my-life
@@ -6592,6 +6679,7 @@ trueblood
trulyminimal trulyminimal
trvl trvl
tsokolate tsokolate
tswplain
ttblog ttblog
ttblog-theme ttblog-theme
ttnews ttnews
@@ -6756,6 +6844,7 @@ up-front
update-tucson update-tucson
updown-cloud updown-cloud
upstart-blogger-modicus upstart-blogger-modicus
uptown
urban urban
urban-grunge urban-grunge
urban-life urban-life
@@ -6839,6 +6928,7 @@ vinoluka
vintage vintage
vintage-camera vintage-camera
vintage-shire vintage-shire
vintage-stamps-theme
vintage-wall vintage-wall
vintage1-camera1 vintage1-camera1
violet-fashion-theme violet-fashion-theme
@@ -6974,6 +7064,7 @@ westkitnet
wetlog wetlog
wfclarity wfclarity
what-so-proudly-we-hail what-so-proudly-we-hail
whatnew
wheat wheat
wheat-lite wheat-lite
whiskey-air whiskey-air
@@ -7146,6 +7237,7 @@ wp-awesome
wp-bats-theme wp-bats-theme
wp-bedrock wp-bedrock
wp-blogcrash wp-blogcrash
wp-blogthirteen
wp-bootstrap wp-bootstrap
wp-boxes wp-boxes
wp-brown wp-brown
@@ -7164,6 +7256,7 @@ wp-eden
wp-faster wp-faster
wp-feedly wp-feedly
wp-fitness-fitness-theme wp-fitness-fitness-theme
wp-flatthirteen
wp-forums wp-forums
wp-foundation wp-foundation
wp-framework wp-framework
@@ -7171,6 +7264,8 @@ wp-freelance-pro
wp-full-site wp-full-site
wp-hot-cook wp-hot-cook
wp-inspirat wp-inspirat
wp-jurist
wp-knowledge-base
wp-knowledge-base-theme wp-knowledge-base-theme
wp-liteflex wp-liteflex
wp-marketingstrap wp-marketingstrap
@@ -7192,7 +7287,9 @@ wp-portaltheme
wp-premium-orange wp-premium-orange
wp-real-estate-theme wp-real-estate-theme
wp-red-post-news-elegant wp-red-post-news-elegant
wp-rootstrap
wp-sanda wp-sanda
wp-simple
wp-soul wp-soul
wp-sponge-bob wp-sponge-bob
wp-strap wp-strap
@@ -7269,6 +7366,7 @@ writers-desk
writers-quill writers-quill
writhem-blog writhem-blog
writing-desk writing-desk
writr
written written
writter writter
wrock-metro wrock-metro
@@ -7364,6 +7462,7 @@ your-existence
youth youth
yui-grid-css yui-grid-css
yukti yukti
yume
yuniho yuniho
yway yway
zack-990 zack-990
@@ -7388,6 +7487,7 @@ zeeflow
zeefocus zeefocus
zeelinear zeelinear
zeemagazine zeemagazine
zeeminty
zeenews zeenews
zeenewspro zeenewspro
zeenoble zeenoble

View File

@@ -34,6 +34,7 @@
<osvdb>97212</osvdb> <osvdb>97212</osvdb>
<cve>2013-4339</cve> <cve>2013-4339</cve>
<secunia>54803</secunia> <secunia>54803</secunia>
<url>http://packetstormsecurity.com/files/123589/</url>
<url>http://core.trac.wordpress.org/changeset/25323</url> <url>http://core.trac.wordpress.org/changeset/25323</url>
</references> </references>
<type>UNKNOWN</type> <type>UNKNOWN</type>

View File

@@ -39,10 +39,6 @@ $LOAD_PATH.unshift(LIB_DIR)
$LOAD_PATH.unshift(WPSCAN_LIB_DIR) $LOAD_PATH.unshift(WPSCAN_LIB_DIR)
$LOAD_PATH.unshift(MODELS_LIB_DIR) $LOAD_PATH.unshift(MODELS_LIB_DIR)
def kali_linux?
%x{uname -a}.match(/linux kali/i) ? true : false
end
require 'environment' require 'environment'
# TODO : add an exclude pattern ? # TODO : add an exclude pattern ?

View File

@@ -10,7 +10,7 @@ class WpVersion < WpItem
unless vulnerabilities.empty? unless vulnerabilities.empty?
puts puts
puts red('[!]') + " We have identified #{vulnerabilities.size} vulnerabilities from the version number:" puts red('[!]') + " #{vulnerabilities.size} vulnerabilities identified from the version number:"
vulnerabilities.output vulnerabilities.output
end end

View File

@@ -13,7 +13,7 @@ Encoding.default_external = Encoding::UTF_8
begin begin
# Standard libs # Standard libs
require 'bundler/setup' unless kali_linux? require 'bundler/setup'
require 'getoptlong' require 'getoptlong'
require 'optparse' # Will replace getoptlong require 'optparse' # Will replace getoptlong
require 'uri' require 'uri'

View File

@@ -9,7 +9,7 @@ class ListGeneratorPlugin < Plugin
['--generate-plugin-list [NUMBER_OF_PAGES]', '--gpl', Integer, 'Generate a new data/plugins.txt file. (supply number of *pages* to parse, default : 150)'], ['--generate-plugin-list [NUMBER_OF_PAGES]', '--gpl', Integer, 'Generate a new data/plugins.txt file. (supply number of *pages* to parse, default : 150)'],
['--generate-full-plugin-list', '--gfpl', 'Generate a new full data/plugins.txt file'], ['--generate-full-plugin-list', '--gfpl', 'Generate a new full data/plugins.txt file'],
['--generate-theme-list [NUMBER_OF_PAGES]', '--gtl', Integer, 'Generate a new data/themes.txt file. (supply number of *pages* to parse, default : 150)'], ['--generate-theme-list [NUMBER_OF_PAGES]', '--gtl', Integer, 'Generate a new data/themes.txt file. (supply number of *pages* to parse, default : 20)'],
['--generate-full-theme-list', '--gftl', 'Generate a new full data/themes.txt file'], ['--generate-full-theme-list', '--gftl', 'Generate a new full data/themes.txt file'],
['--generate-all', '--ga', 'Generate a new full plugins, full themes, popular plugins and popular themes list'] ['--generate-all', '--ga', 'Generate a new full plugins, full themes, popular plugins and popular themes list']
@@ -29,7 +29,7 @@ class ListGeneratorPlugin < Plugin
end end
if options.has_key?(:generate_theme_list) || generate_all if options.has_key?(:generate_theme_list) || generate_all
most_popular('theme', options[:generate_theme_list] || 150) most_popular('theme', options[:generate_theme_list] || 20)
end end
if options[:generate_full_theme_list] || generate_all if options[:generate_full_theme_list] || generate_all