Compare commits

...

136 Commits

Author SHA1 Message Date
erwanlr
49b1829b78 Bumps version 2019-04-08 16:58:26 +01:00
erwanlr
1a5bf4035c Update deps 2019-04-08 09:39:07 +01:00
erwanlr
f3810a1504 Bumps version 2019-04-07 17:45:29 +01:00
erwanlr
4831760c11 Merge branch '3.5.1' 2019-04-07 17:42:51 +01:00
erwanlr
f375d8991e Update deps 2019-04-07 17:35:18 +01:00
erwanlr
8145a4a3a6 Fixes #1330 2019-04-07 17:06:19 +01:00
erwanlr
12c9b49d4c Adds DFs 2019-04-06 11:34:23 +01:00
erwanlr
c8eb81161e Uses https rather than git protocols for CMSScanner dep 2019-04-05 19:53:29 +01:00
erwanlr
8ab246a66c Uses CMSScanner git dep 2019-04-05 19:48:22 +01:00
erwanlr
8dfc4797fa Handles default user_agent_list via CLI option (in CMSScanner) 2019-04-05 19:30:53 +01:00
erwanlr
7888fe1176 Uses ParsedCli 2019-04-05 16:47:14 +01:00
Erwan
8a6f3056a3 Merge pull request #1329 from wpscanteam/dependabot/bundler/rubocop-tw-0.67.1
Update rubocop requirement from ~> 0.66.0 to ~> 0.67.1
2019-04-05 11:37:00 +02:00
dependabot[bot]
5fbdf9e013 Update rubocop requirement from ~> 0.66.0 to ~> 0.67.1
Updates the requirements on [rubocop](https://github.com/rubocop-hq/rubocop) to permit the latest version.
- [Release notes](https://github.com/rubocop-hq/rubocop/releases)
- [Changelog](https://github.com/rubocop-hq/rubocop/blob/master/CHANGELOG.md)
- [Commits](https://github.com/rubocop-hq/rubocop/compare/v0.66.0...v0.67.1)

Signed-off-by: dependabot[bot] <support@dependabot.com>
2019-04-05 06:16:13 +00:00
erwanlr
1da2f5e823 Sets the Target#mu_plugind to true when detected passively 2019-04-04 17:25:58 +01:00
erwanlr
888779f81b Support of Ruby 2.3 removed as its life ended 2019-04-04 15:40:21 +01:00
erwanlr
352286e497 Adds a #maybe_add_cookies to handle website requiring a specific cookie 2019-04-03 19:08:52 +01:00
erwanlr
025ce37c05 Bumps version 2019-04-03 12:32:07 +01:00
erwanlr
d6c2c63679 Updates deps 2019-04-03 10:14:28 +01:00
erwanlr
49efbf25ea Adds detection of Plugin/Theme via errors 500 and custom 401/403 - Fixes #1090 2019-04-03 08:22:31 +01:00
erwanlr
02cdee2776 Retains db_data for Plugin, Theme and WpVersion models 2019-04-02 17:10:07 +01:00
erwanlr
7c9d4d5b05 Updates deps 2019-04-02 11:56:59 +01:00
erwanlr
609b7551f8 Forces GC to start only after Plugin/Theme DF generation 2019-04-02 09:47:16 +01:00
erwanlr
e8f215ae00 Forces the Garbage Collector to run after creating the DFs 2019-04-01 19:39:40 +01:00
erwanlr
2e00aea16e Mem tests 2019-04-01 12:19:40 +01:00
erwanlr
dd274d77f5 Updates deps 2019-04-01 11:15:02 +01:00
Erwan
58171a7b8c Fixes CodeClimate URL 2019-03-30 16:00:32 +01:00
erwanlr
8b05179401 Adds DFs 2019-03-30 14:17:09 +00:00
erwanlr
51d61a7e88 Adds DFs 2019-03-30 12:15:08 +00:00
erwanlr
d653ce4e0e Adds DFs 2019-03-30 11:11:27 +00:00
erwanlr
07b3826806 Adds DFs 2019-03-30 07:22:14 +00:00
erwanlr
1baa3e23b2 Fixes #1326 2019-03-29 08:27:18 +00:00
erwanlr
0aa1f20d47 Removes Changelog detection 2019-03-28 13:40:58 +00:00
erwanlr
1cf330b389 Merge branch 'master' into 3.5.0 2019-03-28 06:45:48 +00:00
erwanlr
1771c4b346 Updates Ruby version 2019-03-27 17:44:47 +00:00
erwanlr
4c053b4873 Updates dockerignore to ignore profiling executables as well 2019-03-27 14:25:58 +00:00
erwanlr
743ba0541b Updates finders to use new methods 2019-03-26 21:10:14 +00:00
erwanlr
cfab2a9cd7 Uses the new CMSScanner Enumerator module 2019-03-26 17:05:19 +00:00
erwanlr
32270efd65 Updates plugin version detection via Readme 2019-03-26 09:02:23 +00:00
erwanlr
7ea1acb7c1 Fixes non detection of plugin/theme readme and changelog files due to changes in CMSSCanner 2019-03-25 21:25:00 +00:00
erwanlr
bf91f60242 Uses the new Browser#forge_request method 2019-03-25 20:42:43 +00:00
Ryan Dewhurst
660885c0b1 Try to resolve weird char after readme conversion 2019-03-25 09:49:03 +01:00
erwanlr
15fd3b969f Uses head_and_get to check for Readme and Changelog locations 2019-03-24 22:01:19 +00:00
erwanlr
f1d15ca7f2 Updates spec for latest changes 2019-03-24 20:24:14 +00:00
erwanlr
6f4f4a5924 Typo 2019-03-24 20:15:43 +00:00
erwanlr
9af0520701 Delegates #head_and_get to #blog in WpItem models 2019-03-24 20:06:03 +00:00
erwanlr
2edeab558e Adds ruby frozen_string_literal comment to profiling bins 2019-03-24 19:57:59 +00:00
erwanlr
87bf59f50b Merge branch 'master' of github.com:wpscanteam/wpscan 2019-03-24 14:38:25 +00:00
erwanlr
eeb69e63f7 Adds DFs 2019-03-24 14:38:01 +00:00
erwanlr
f9435906e7 Merges with Master (and solves conflicts) 2019-03-24 13:01:29 +00:00
Ryan Dewhurst
6c8adbe50e Remove strange char when converted to html 2019-03-23 10:37:05 +01:00
Ryan Dewhurst
23bdb6c579 Open readme links in new tab 2019-03-23 10:14:51 +01:00
Ryan Dewhurst
264411bfb9 Update README.md 2019-03-23 10:00:50 +01:00
Ryan Dewhurst
2104237584 Update README.md 2019-03-23 09:57:50 +01:00
Ryan Dewhurst
0ae2525737 Update README.md 2019-03-23 09:57:33 +01:00
Ryan Dewhurst
b12973a837 Add projects links to the top of Readme 2019-03-23 09:41:14 +01:00
erwanlr
fa0582ce0b Uses head or get method to enumerate config backups 2019-03-22 20:35:22 +00:00
erwanlr
231f5157bf Fixes #1322 2019-03-22 20:20:07 +00:00
erwanlr
8b18204a69 Updates memory_profiler dep, revert changes to memory allocated commit (increased retained memory too much) 2019-03-22 06:56:10 +00:00
erwanlr
95eb6a732c Memprofiling - Increases the top to be displayed to 15 2019-03-21 20:50:57 +00:00
erwanlr
047a188b34 Uses the frozen_string_literal magic comment (will be the default in Ruby 3) 2019-03-21 17:41:29 +00:00
erwanlr
d407815c30 Adds comment about scale_bytes in memory_profiler 2019-03-21 16:54:06 +00:00
erwanlr
1f0f87633b Reduces memory allocation with creating DFs 2019-03-21 13:52:34 +00:00
erwanlr
c15ff4e32e Adds memprof binary - Ref #1321 2019-03-21 12:45:44 +00:00
erwanlr
72bddca314 Adds profiling binary for dev [WIP] - Ref #1321 2019-03-20 21:12:53 +00:00
erwanlr
496fc4ebee Typo 2019-03-20 20:12:18 +00:00
erwanlr
f414e6eeb7 Better code for WpVersion#all 2019-03-20 20:10:30 +00:00
erwanlr
f09606cfa3 Fixes #1319 2019-03-20 15:42:05 +00:00
erwanlr
6304fe4c19 Fixes #1318 2019-03-20 08:41:39 +00:00
erwanlr
5f2b8f8a2e Fixes #1317 2019-03-20 07:47:28 +00:00
erwanlr
898e8d4546 Moves Models into their own namespace - Ref #1315 2019-03-19 21:07:53 +00:00
erwanlr
f1657164d5 Errors moved into their own namespace - Ref #1315 2019-03-19 19:09:16 +00:00
erwanlr
357e13be2b Updates cms_scanner dep 2019-03-19 18:52:18 +00:00
erwanlr
9685568c75 Updates deps 2019-03-19 10:55:50 +00:00
erwanlr
b316940790 Merge branch 'enum-head' 2019-03-18 20:40:36 +00:00
erwanlr
2ced489e1e Updates deps 2019-03-18 20:37:24 +00:00
erwanlr
5969fe08d8 Revert changes related to the unexpected return - Ref #1314 2019-03-18 19:24:02 +00:00
erwanlr
4a427f1ff6 Adds a custom temporary Enumerator for Plugins,Themes and Timthumbs 2019-03-18 19:15:43 +00:00
erwanlr
9a3db275f3 Merge branch 'master' of github.com:wpscanteam/wpscan 2019-03-17 07:25:09 +00:00
erwanlr
475dd4d1ff Ref #1314 2019-03-17 07:24:49 +00:00
erwanlr
57c99c4a34 Fixes #1313 2019-03-17 06:59:44 +00:00
Christian Mehlmauer
966f5691a2 update image 2019-03-16 19:48:47 +01:00
erwanlr
5088ece8a1 Updates deps 2019-03-16 12:35:19 +00:00
erwanlr
943d87fe17 Updates deps 2019-03-16 09:31:01 +00:00
erwanlr
b5363b2689 Adds DFs 2019-03-16 08:38:07 +00:00
erwanlr
c15cb16ca8 Update deps 2019-03-15 14:09:31 +00:00
erwanlr
18b7f088fc Adds ruby versions to Travis 2019-03-15 12:47:06 +00:00
erwanlr
4f9822743c Improves Password Attack against wp-login.php to avoid FP 2019-03-14 19:21:39 +00:00
erwanlr
e7925de5bc Check the wp-login.php for potential redirection before using it 2019-03-14 18:06:32 +00:00
erwanlr
27fc6a7279 Updates cms_scanner dep 2019-03-14 11:55:20 +00:00
erwanlr
ab5f46e955 Adds detection of wp-content from raw JS 2019-03-14 09:14:55 +00:00
erwanlr
d30d212cc5 Updates WP DF (also check non minified file paths) - Ref #1311 2019-03-12 07:55:32 +00:00
erwanlr
adff971d62 Bumps version 2019-03-10 09:47:41 +00:00
erwanlr
23b22f71b8 Reduces confidence of wp-cron detection 2019-03-10 08:02:51 +00:00
erwanlr
fee3671e32 Adds wp-cron.php detection - Fixes #1299 2019-03-10 07:53:12 +00:00
erwanlr
26c6be7268 Fixes #1307 2019-03-10 07:11:48 +00:00
erwanlr
01c5bcf2be Adds DFs 2019-03-09 16:19:25 +00:00
erwanlr
1ab8a5ab98 Updates deps 2019-03-07 19:37:01 +00:00
erwanlr
b54aaca28a Adds missing lines 2019-03-04 07:40:45 +00:00
erwanlr
86a29ae000 Adds DF 2019-03-04 07:35:21 +00:00
erwanlr
a5dbee93ff Adds DFs 2019-03-02 10:43:45 +00:00
Christian Mehlmauer
e0465e6e10 remove line 2019-02-28 08:41:19 +01:00
Christian Mehlmauer
7da48b9dd1 readme linting 2019-02-28 08:18:01 +01:00
Christian Mehlmauer
a64895c3a6 remove UTF characters from license 2019-02-28 08:13:42 +01:00
erwanlr
21f1a5d4c4 Adds DFs 2019-02-23 08:27:27 +00:00
erwanlr
d60f79ca33 Adds DFs 2019-02-16 13:20:51 +00:00
Erwan
2d5cea5033 Adds missing #to_s calls again 2019-02-11 21:14:40 +01:00
erwanlr
b0615215fe Adds missing #to_s calls 2019-02-11 20:03:05 +00:00
erwanlr
7a0f98b2cb Uses Pathname#join rather than File#join when possible 2019-02-11 19:56:07 +00:00
erwanlr
cdc1dab4a6 Bumps version 2019-02-11 11:48:49 +00:00
erwanlr
431739ab19 Updates Rubocop dep 2019-02-11 10:44:29 +00:00
erwanlr
1780399050 Fixes #1277 2019-02-10 15:32:30 +00:00
erwanlr
eb75d38716 Fixes #1284 2019-02-10 13:47:19 +00:00
erwanlr
06f82d78f4 Ref #1285 - Adds comment about the pagination 2019-02-10 10:49:03 +00:00
erwanlr
dee4da1c0e Fixes #1285 2019-02-10 10:45:54 +00:00
erwanlr
e341ec7c60 Adds DFs 2019-02-10 09:44:17 +00:00
Erwan
9146609e4a Update Readme, Fixes #1286 2019-02-03 20:46:03 +01:00
erwanlr
f90615ca41 Adds DF 2019-02-03 07:08:05 +00:00
erwanlr
8a2a6a05ff Adds DFs 2019-01-27 10:54:13 +00:00
Erwan
5a787f8ed5 Adds a note about bug in Ruby 2.5.x, Ref #1283 2019-01-25 20:14:14 +00:00
erwanlr
a904053002 Adds DFs 2019-01-20 17:04:32 +00:00
Erwan
70ecd30dcc Merge pull request #1276 from wpscanteam/dependabot/bundler/rubocop-tw-0.63.0
Update rubocop requirement from ~> 0.62.0 to ~> 0.63.0
2019-01-17 09:32:24 +00:00
dependabot[bot]
b0976d7e47 Update rubocop requirement from ~> 0.62.0 to ~> 0.63.0
Updates the requirements on [rubocop](https://github.com/rubocop-hq/rubocop) to permit the latest version.
- [Release notes](https://github.com/rubocop-hq/rubocop/releases)
- [Changelog](https://github.com/rubocop-hq/rubocop/blob/master/CHANGELOG.md)
- [Commits](https://github.com/rubocop-hq/rubocop/commits/v0.63.0)

Signed-off-by: dependabot[bot] <support@dependabot.com>
2019-01-17 05:54:18 +00:00
erwanlr
bb5e55016c Adds DFs 2019-01-13 16:56:13 +00:00
erwanlr
abdf285c69 Bumps version 2019-01-11 11:53:11 +00:00
erwanlr
fd4da23d4f Creates simplecov exetrnal config 2019-01-11 11:13:49 +00:00
erwanlr
bb8f58c83b Updates deps 2019-01-11 11:12:34 +00:00
erwanlr
077da6ae86 Moves require spec_helper to config file 2019-01-11 11:11:56 +00:00
erwanlr
d5222d7e9a Adds DFs 2019-01-07 14:58:03 +00:00
erwanlr
01702c127b Tries to fix Travis again 2019-01-07 11:47:58 +00:00
Erwan
87902cbfb4 Tries to fix Travis builds 2019-01-07 10:54:05 +00:00
ethicalhack3r
fcaa393ffe Update license 2019-01-07 10:54:24 +01:00
ethicalhack3r
18bac6e792 Update to Ruby 2.6.0 2019-01-07 10:16:32 +01:00
erwanlr
9a21efebe3 Updates DFs 2018-12-28 22:50:05 +00:00
erwanlr
357182ef17 Adds DFs 2018-12-28 22:43:41 +00:00
erwanlr
5fad540a4c Bumps version 2018-12-28 13:35:01 +00:00
erwanlr
c1fc153420 Updates Deps, ref #1266 2018-12-28 11:17:37 +00:00
1102 changed files with 174384 additions and 1255 deletions

View File

@@ -12,5 +12,5 @@ spec/
Dockerfile Dockerfile
**/*.orig **/*.orig
*.orig *.orig
bin/wpscan-docker* bin/wpscan-*
.wpscan/ .wpscan/

3
.gitignore vendored
View File

@@ -21,3 +21,6 @@ doc/
# Old files from v2 # Old files from v2
cache/ cache/
data/ data/
# Profiling reports
bin/memprof*.report

1
.rspec
View File

@@ -1,2 +1,3 @@
--color --color
--fail-fast --fail-fast
--require spec_helper

View File

@@ -1,5 +1,5 @@
AllCops: AllCops:
TargetRubyVersion: 2.3 TargetRubyVersion: 2.4
Exclude: Exclude:
- '*.gemspec' - '*.gemspec'
- 'vendor/**/*' - 'vendor/**/*'
@@ -22,7 +22,5 @@ Metrics/CyclomaticComplexity:
Max: 8 Max: 8
Style/Documentation: Style/Documentation:
Enabled: false Enabled: false
Style/FrozenStringLiteralComment:
Enabled: false
Style/FormatStringToken: Style/FormatStringToken:
Enabled: false Enabled: false

View File

@@ -1 +1 @@
2.5.3 2.6.2

4
.simplecov Normal file
View File

@@ -0,0 +1,4 @@
SimpleCov.start do
add_filter '/spec/'
add_filter 'helper'
end

View File

@@ -2,28 +2,25 @@ language: ruby
sudo: false sudo: false
cache: bundler cache: bundler
rvm: rvm:
- 2.3.0
- 2.3.1
- 2.3.2
- 2.3.3
- 2.3.4
- 2.3.5
- 2.3.6
- 2.3.7
- 2.3.8
- 2.4.1 - 2.4.1
- 2.4.2 - 2.4.2
- 2.4.3 - 2.4.3
- 2.4.4 - 2.4.4
- 2.4.5 - 2.4.5
- 2.4.6
- 2.5.0 - 2.5.0
- 2.5.1 - 2.5.1
- 2.5.2 - 2.5.2
- 2.5.3 - 2.5.3
- 2.5.4
- 2.5.5
- 2.6.0
- 2.6.1
- 2.6.2
- ruby-head - ruby-head
before_install: before_install:
- "echo 'gem: --no-ri --no-rdoc' > ~/.gemrc" - "echo 'gem: --no-ri --no-rdoc' > ~/.gemrc"
- "gem update --system" - gem update --system
matrix: matrix:
allow_failures: allow_failures:
- rvm: ruby-head - rvm: ruby-head

View File

@@ -1,4 +1,4 @@
FROM ruby:2.5.1-alpine AS builder FROM ruby:2.6.2-alpine3.9 AS builder
LABEL maintainer="WPScan Team <team@wpscan.org>" LABEL maintainer="WPScan Team <team@wpscan.org>"
ARG BUNDLER_ARGS="--jobs=8 --without test development" ARG BUNDLER_ARGS="--jobs=8 --without test development"
@@ -19,7 +19,7 @@ RUN rake install --trace
RUN chmod -R a+r /usr/local/bundle RUN chmod -R a+r /usr/local/bundle
FROM ruby:2.5-alpine FROM ruby:2.6.2-alpine3.9
LABEL maintainer="WPScan Team <team@wpscan.org>" LABEL maintainer="WPScan Team <team@wpscan.org>"
RUN adduser -h /wpscan -g WPScan -D wpscan RUN adduser -h /wpscan -g WPScan -D wpscan

View File

@@ -1,2 +1,6 @@
# frozen_string_literal: true
source 'https://rubygems.org' source 'https://rubygems.org'
gemspec gemspec
# gem 'cms_scanner', branch: 'xxx', git: 'https://github.com/wpscanteam/CMSScanner.git'

10
LICENSE
View File

@@ -1,14 +1,14 @@
WPScan Public Source License WPScan Public Source License
The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2018 WPScan Team. The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2019 WPScan Team.
Cases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below. Cases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below.
1. Definitions 1. Definitions
1.1 License means this document. 1.1 "License" means this document.
1.2 Contributor means each individual or legal entity that creates, contributes to the creation of, or owns WPScan. 1.2 "Contributor" means each individual or legal entity that creates, contributes to the creation of, or owns WPScan.
1.3 WPScan Team means WPScans core developers, an updated list of whom can be found within the CREDITS file. 1.3 "WPScan Team" means WPScans core developers.
2. Commercialization 2. Commercialization
@@ -59,7 +59,7 @@ WPScan is provided under an AS-IS basis and without any support, updates or main
8. Disclaimer of Warranty 8. Disclaimer of Warranty
WPScan is provided under this License on an as is basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the WPScan is free of defects, merchantable, fit for a particular purpose or non-infringing. WPScan is provided under this License on an "as is" basis, without warranty of any kind, either expressed, implied, or statutory, including, without limitation, warranties that the WPScan is free of defects, merchantable, fit for a particular purpose or non-infringing.
9. Limitation of Liability 9. Limitation of Liability

112
README.md
View File

@@ -1,29 +1,49 @@
![alt text](https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png "WPScan - WordPress Security Scanner") <p align="center">
<a href="https://wpscan.org/">
<img src="https://raw.githubusercontent.com/wpscanteam/wpscan/gh-pages/images/wpscan_logo.png" alt="WPScan logo">
</a>
</p>
[![Gem Version](https://badge.fury.io/rb/wpscan.svg)](https://badge.fury.io/rb/wpscan) <h3 align="center">WPScan</h3>
[![Build Status](https://travis-ci.org/wpscanteam/wpscan.svg?branch=master)](https://travis-ci.org/wpscanteam/wpscan)
[![Code Climate](https://codeclimate.com/github/wpscanteam/wpscan/badges/gpa.svg)](https://codeclimate.com/github/wpscanteam/wpscan) <p align="center">
[![Patreon Donate](https://img.shields.io/badge/patreon-donate-green.svg)](https://www.patreon.com/wpscan) WordPress Vulnerability Scanner
<br>
<br>
<a href="https://wpscan.org/" title="homepage" target="_blank">Homepage</a> - <a href="https://wpscan.io/" title="wpscan.io" target="_blank">WPScan.io</a> - <a href="https://wpvulndb.com/" title="vulnerability database" target="_blank">Vulnerability Database</a> - <a href="https://wordpress.org/plugins/wpscan/" title="wordpress plugin" target="_blank">WordPress Plugin</a>
</p>
<p align="center">
<a href="https://badge.fury.io/rb/wpscan" target="_blank"><img src="https://badge.fury.io/rb/wpscan.svg"></a>
<a href="https://travis-ci.org/wpscanteam/wpscan" target="_blank"><img src="https://travis-ci.org/wpscanteam/wpscan.svg?branch=master"></a>
<a href="https://codeclimate.com/github/wpscanteam/wpscan" target="_blank"><img src="https://codeclimate.com/github/wpscanteam/wpscan/badges/gpa.svg"></a>
<a href="https://www.patreon.com/wpscan" target="_blank"><img src="https://img.shields.io/badge/patreon-donate-green.svg"></a>
</p>
# INSTALL # INSTALL
## Prerequisites: ## Prerequisites
- (Optional but highly recommended: [RVM](https://rvm.io/rvm/install))
- Ruby >= 2.3 - Recommended: latest - Ruby >= 2.3 - Recommended: latest
- Curl >= 7.21 - Recommended: latest - FYI the 7.29 has a segfault - Ruby 2.5.0 to 2.5.3 can cause an 'undefined symbol: rmpd_util_str_to_d' error in some systems, see [#1283](https://github.com/wpscanteam/wpscan/issues/1283)
- Curl >= 7.21 - Recommended: latest
- The 7.29 has a segfault
- RubyGems - Recommended: latest - RubyGems - Recommended: latest
### From RubyGems: ### From RubyGems (Recommended)
``` ```shell
gem install wpscan gem install wpscan
``` ```
### From sources: On MacOSX, if a ```Gem::FilePermissionError``` is raised due to the Apple's System Integrity Protection (SIP), either install RVM and install wpscan again, or run ```sudo gem install -n /usr/local/bin wpscan``` (see [#1286](https://github.com/wpscanteam/wpscan/issues/1286))
### From sources (NOT Recommended)
Prerequisites: Git Prerequisites: Git
``` ```shell
git clone https://github.com/wpscanteam/wpscan git clone https://github.com/wpscanteam/wpscan
cd wpscan/ cd wpscan/
@@ -31,19 +51,28 @@ cd wpscan/
bundle install && rake install bundle install && rake install
``` ```
# Updating
You can update the local database by using ```wpscan --update```
Updating WPScan itself is either done via ```gem update wpscan``` or the packages manager (this is quite important for distributions such as in Kali Linux: ```apt-get update && apt-get upgrade```) depending how WPScan was (pre)installed
# Docker # Docker
Pull the repo with ```docker pull wpscanteam/wpscan``` Pull the repo with ```docker pull wpscanteam/wpscan```
Enumerating usernames Enumerating usernames
```
```shell
docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u
``` ```
Enumerating a range of usernames Enumerating a range of usernames
```
```shell
docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u1-100 docker run -it --rm wpscanteam/wpscan --url https://target.tld/ --enumerate u1-100
``` ```
** replace u1-100 with a range of your choice. ** replace u1-100 with a range of your choice.
# Usage # Usage
@@ -57,55 +86,50 @@ The DB is located at ~/.wpscan/db
WPScan can load all options (including the --url) from configuration files, the following locations are checked (order: first to last): WPScan can load all options (including the --url) from configuration files, the following locations are checked (order: first to last):
* ~/.wpscan/cli_options.json - ~/.wpscan/cli_options.json
* ~/.wpscan/cli_options.yml - ~/.wpscan/cli_options.yml
* pwd/.wpscan/cli_options.json - pwd/.wpscan/cli_options.json
* pwd/.wpscan/cli_options.yml - pwd/.wpscan/cli_options.yml
If those files exist, options from them will be loaded and overridden if found twice. If those files exist, options from them will be loaded and overridden if found twice.
e.g: e.g:
~/.wpscan/cli_options.yml: ~/.wpscan/cli_options.yml:
```
```yml
proxy: 'http://127.0.0.1:8080' proxy: 'http://127.0.0.1:8080'
verbose: true verbose: true
``` ```
pwd/.wpscan/cli_options.yml: pwd/.wpscan/cli_options.yml:
```
```yml
proxy: 'socks5://127.0.0.1:9090' proxy: 'socks5://127.0.0.1:9090'
url: 'http://target.tld' url: 'http://target.tld'
``` ```
Running ```wpscan``` in the current directory (pwd), is the same as ```wpscan -v --proxy socks5://127.0.0.1:9090 --url http://target.tld``` Running ```wpscan``` in the current directory (pwd), is the same as ```wpscan -v --proxy socks5://127.0.0.1:9090 --url http://target.tld```
Enumerating usernames Enumerating usernames
```
```shell
wpscan --url https://target.tld/ --enumerate u wpscan --url https://target.tld/ --enumerate u
``` ```
Enumerating a range of usernames Enumerating a range of usernames
```
```shell
wpscan --url https://target.tld/ --enumerate u1-100 wpscan --url https://target.tld/ --enumerate u1-100
``` ```
** replace u1-100 with a range of your choice. ** replace u1-100 with a range of your choice.
# PROJECT HOME
[https://wpscan.org](https://wpscan.org)
# VULNERABILITY DATABASE
[https://wpvulndb.com](https://wpvulndb.com)
# LICENSE # LICENSE
## WPScan Public Source License ## WPScan Public Source License
The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2018 WPScan Team. The WPScan software (henceforth referred to simply as "WPScan") is dual-licensed - Copyright 2011-2019 WPScan Team.
Cases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below. Cases that include commercialization of WPScan require a commercial, non-free license. Otherwise, WPScan can be used without charge under the terms set out below.
@@ -115,7 +139,7 @@ Cases that include commercialization of WPScan require a commercial, non-free li
1.2 "Contributor" means each individual or legal entity that creates, contributes to the creation of, or owns WPScan. 1.2 "Contributor" means each individual or legal entity that creates, contributes to the creation of, or owns WPScan.
1.3 "WPScan Team" means WPScans core developers, an updated list of whom can be found within the CREDITS file. 1.3 "WPScan Team" means WPScans core developers.
### 2. Commercialization ### 2. Commercialization
@@ -123,30 +147,28 @@ A commercial use is one intended for commercial advantage or monetary compensati
Example cases of commercialization are: Example cases of commercialization are:
- Using WPScan to provide commercial managed/Software-as-a-Service services. - Using WPScan to provide commercial managed/Software-as-a-Service services.
- Distributing WPScan as a commercial product or as part of one. - Distributing WPScan as a commercial product or as part of one.
- Using WPScan as a value added service/product. - Using WPScan as a value added service/product.
Example cases which do not require a commercial license, and thus fall under the terms set out below, include (but are not limited to): Example cases which do not require a commercial license, and thus fall under the terms set out below, include (but are not limited to):
- Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit. - Penetration testers (or penetration testing organizations) using WPScan as part of their assessment toolkit.
- Penetration Testing Linux Distributions including but not limited to Kali Linux, SamuraiWTF, BackBox Linux. - Penetration Testing Linux Distributions including but not limited to Kali Linux, SamuraiWTF, BackBox Linux.
- Using WPScan to test your own systems. - Using WPScan to test your own systems.
- Any non-commercial use of WPScan. - Any non-commercial use of WPScan.
If you need to purchase a commercial license or are unsure whether you need to purchase a commercial license contact us - team@wpscan.org. If you need to purchase a commercial license or are unsure whether you need to purchase a commercial license contact us - team@wpscan.org.
We may grant commercial licenses at no monetary cost at our own discretion if the commercial usage is deemed by the WPScan Team to significantly benefit WPScan.
Free-use Terms and Conditions; Free-use Terms and Conditions;
### 3. Redistribution ### 3. Redistribution
Redistribution is permitted under the following conditions: Redistribution is permitted under the following conditions:
- Unmodified License is provided with WPScan. - Unmodified License is provided with WPScan.
- Unmodified Copyright notices are provided with WPScan. - Unmodified Copyright notices are provided with WPScan.
- Does not conflict with the commercialization clause. - Does not conflict with the commercialization clause.
### 4. Copying ### 4. Copying

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'models' require_relative 'models'
require_relative 'finders' require_relative 'finders'
require_relative 'controllers' require_relative 'controllers'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'controllers/core' require_relative 'controllers/core'
require_relative 'controllers/custom_directories' require_relative 'controllers/custom_directories'
require_relative 'controllers/wp_version' require_relative 'controllers/wp_version'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Controller to add the aliases in the CLI # Controller to add the aliases in the CLI

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Specific Core controller to include WordPress checks # Specific Core controller to include WordPress checks
@@ -25,53 +27,56 @@ module WPScan
# @return [ Boolean ] # @return [ Boolean ]
def update_db_required? def update_db_required?
if local_db.missing_files? if local_db.missing_files?
raise MissingDatabaseFile if parsed_options[:update] == false raise Error::MissingDatabaseFile if ParsedCli.update == false
return true return true
end end
return parsed_options[:update] unless parsed_options[:update].nil? return ParsedCli.update unless ParsedCli.update.nil?
return false unless user_interaction? && local_db.outdated? return false unless user_interaction? && local_db.outdated?
output('@notice', msg: 'It seems like you have not updated the database for some time.') output('@notice', msg: 'It seems like you have not updated the database for some time.')
print '[?] Do you want to update now? [Y]es [N]o, default: [N]' print '[?] Do you want to update now? [Y]es [N]o, default: [N]'
Readline.readline =~ /^y/i ? true : false /^y/i.match?(Readline.readline) ? true : false
end end
def update_db def update_db
output('db_update_started') output('db_update_started')
output('db_update_finished', updated: local_db.update, verbose: parsed_options[:verbose]) output('db_update_finished', updated: local_db.update, verbose: ParsedCli.verbose)
exit(0) unless parsed_options[:url] exit(0) unless ParsedCli.url
end end
def before_scan def before_scan
@last_update = local_db.last_update @last_update = local_db.last_update
maybe_output_banner_help_and_version # From CMS Scanner maybe_output_banner_help_and_version # From CMSScanner
update_db if update_db_required? update_db if update_db_required?
setup_cache setup_cache
check_target_availability check_target_availability
load_server_module load_server_module
check_wordpress_state check_wordpress_state
rescue Error::NotWordPress => e
target.maybe_add_cookies
raise e unless target.wordpress?(ParsedCli.detection_mode)
end end
# Raises errors if the target is hosted on wordpress.com or is not running WordPress # Raises errors if the target is hosted on wordpress.com or is not running WordPress
# Also check if the homepage_url is still the install url # Also check if the homepage_url is still the install url
def check_wordpress_state def check_wordpress_state
raise WordPressHostedError if target.wordpress_hosted? raise Error::WordPressHosted if target.wordpress_hosted?
if Addressable::URI.parse(target.homepage_url).path =~ %r{/wp-admin/install.php$}i if %r{/wp-admin/install.php$}i.match?(Addressable::URI.parse(target.homepage_url).path)
output('not_fully_configured', url: target.homepage_url) output('not_fully_configured', url: target.homepage_url)
exit(WPScan::ExitCode::VULNERABLE) exit(WPScan::ExitCode::VULNERABLE)
end end
raise NotWordPressError unless target.wordpress? || parsed_options[:force] raise Error::NotWordPress unless target.wordpress?(ParsedCli.detection_mode) || ParsedCli.force
end end
# Loads the related server module in the target # Loads the related server module in the target
@@ -83,7 +88,7 @@ module WPScan
server = target.server || :Apache # Tries to auto detect the server server = target.server || :Apache # Tries to auto detect the server
# Force a specific server module to be loaded if supplied # Force a specific server module to be loaded if supplied
case parsed_options[:server] case ParsedCli.server
when :apache when :apache
server = :Apache server = :Apache
when :iis when :iis
@@ -95,7 +100,7 @@ module WPScan
mod = CMSScanner::Target::Server.const_get(server) mod = CMSScanner::Target::Server.const_get(server)
target.extend mod target.extend mod
WPScan::WpItem.include mod Model::WpItem.include mod
server server
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Controller to ensure that the wp-content and wp-plugins # Controller to ensure that the wp-content and wp-plugins
@@ -11,12 +13,12 @@ module WPScan
end end
def before_scan def before_scan
target.content_dir = parsed_options[:wp_content_dir] if parsed_options[:wp_content_dir] target.content_dir = ParsedCli.wp_content_dir if ParsedCli.wp_content_dir
target.plugins_dir = parsed_options[:wp_plugins_dir] if parsed_options[:wp_plugins_dir] target.plugins_dir = ParsedCli.wp_plugins_dir if ParsedCli.wp_plugins_dir
return if target.content_dir return if target.content_dir
raise 'Unable to identify the wp-content dir, please supply it with --wp-content-dir' raise Error::WpContentDirNotDetected
end end
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'enumeration/cli_options' require_relative 'enumeration/cli_options'
require_relative 'enumeration/enum_methods' require_relative 'enumeration/enum_methods'
@@ -8,10 +10,14 @@ module WPScan
def before_scan def before_scan
DB::DynamicFinders::Plugin.create_versions_finders DB::DynamicFinders::Plugin.create_versions_finders
DB::DynamicFinders::Theme.create_versions_finders DB::DynamicFinders::Theme.create_versions_finders
# Force the Garbage Collector to run due to the above method being
# quite heavy in objects allocation
GC.start
end end
def run def run
enum = parsed_options[:enumerate] || {} enum = ParsedCli.enumerate || {}
enum_plugins if enum_plugins?(enum) enum_plugins if enum_plugins?(enum)
enum_themes if enum_themes?(enum) enum_themes if enum_themes?(enum)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Enumeration CLI Options # Enumeration CLI Options
@@ -98,7 +100,7 @@ module WPScan
[ [
OptFilePath.new( OptFilePath.new(
['--timthumbs-list FILE-PATH', 'List of timthumbs\' location to use'], ['--timthumbs-list FILE-PATH', 'List of timthumbs\' location to use'],
exists: true, default: File.join(DB_DIR, 'timthumbs-v3.txt'), advanced: true exists: true, default: DB_DIR.join('timthumbs-v3.txt').to_s, advanced: true
), ),
OptChoice.new( OptChoice.new(
['--timthumbs-detection MODE', ['--timthumbs-detection MODE',
@@ -113,7 +115,7 @@ module WPScan
[ [
OptFilePath.new( OptFilePath.new(
['--config-backups-list FILE-PATH', 'List of config backups\' filenames to use'], ['--config-backups-list FILE-PATH', 'List of config backups\' filenames to use'],
exists: true, default: File.join(DB_DIR, 'config_backups.txt'), advanced: true exists: true, default: DB_DIR.join('config_backups.txt').to_s, advanced: true
), ),
OptChoice.new( OptChoice.new(
['--config-backups-detection MODE', ['--config-backups-detection MODE',
@@ -128,7 +130,7 @@ module WPScan
[ [
OptFilePath.new( OptFilePath.new(
['--db-exports-list FILE-PATH', 'List of DB exports\' paths to use'], ['--db-exports-list FILE-PATH', 'List of DB exports\' paths to use'],
exists: true, default: File.join(DB_DIR, 'db_exports.txt'), advanced: true exists: true, default: DB_DIR.join('db_exports.txt').to_s, advanced: true
), ),
OptChoice.new( OptChoice.new(
['--db-exports-detection MODE', ['--db-exports-detection MODE',

View File

@@ -1,37 +1,53 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Enumeration Methods # Enumeration Methods
class Enumeration < CMSScanner::Controller::Base class Enumeration < CMSScanner::Controller::Base
# @param [ String ] type (plugins or themes) # @param [ String ] type (plugins or themes)
# @param [ Symbol ] detection_mode
# #
# @return [ String ] The related enumration message depending on the parsed_options and type supplied # @return [ String ] The related enumration message depending on the ParsedCli and type supplied
def enum_message(type) def enum_message(type, detection_mode)
return unless %w[plugins themes].include?(type) return unless %w[plugins themes].include?(type)
details = if parsed_options[:enumerate][:"vulnerable_#{type}"] details = if ParsedCli.enumerate[:"vulnerable_#{type}"]
'Vulnerable' 'Vulnerable'
elsif parsed_options[:enumerate][:"all_#{type}"] elsif ParsedCli.enumerate[:"all_#{type}"]
'All' 'All'
else else
'Most Popular' 'Most Popular'
end end
"Enumerating #{details} #{type.capitalize}" "Enumerating #{details} #{type.capitalize} #{enum_detection_message(detection_mode)}"
end
# @param [ Symbol ] detection_mode
#
# @return [ String ]
def enum_detection_message(detection_mode)
detection_method = if detection_mode == :mixed
'Passive and Aggressive'
else
detection_mode.to_s.capitalize
end
"(via #{detection_method} Methods)"
end end
# @param [ String ] type (plugins, themes etc) # @param [ String ] type (plugins, themes etc)
# #
# @return [ Hash ] # @return [ Hash ]
def default_opts(type) def default_opts(type)
mode = parsed_options[:"#{type}_detection"] || parsed_options[:detection_mode] mode = ParsedCli.options[:"#{type}_detection"] || ParsedCli.detection_mode
{ {
mode: mode, mode: mode,
exclude_content: parsed_options[:exclude_content_based], exclude_content: ParsedCli.exclude_content_based,
show_progression: user_interaction?, show_progression: user_interaction?,
version_detection: { version_detection: {
mode: parsed_options[:"#{type}_version_detection"] || mode, mode: ParsedCli.options[:"#{type}_version_detection"] || mode,
confidence_threshold: parsed_options[:"#{type}_version_all"] ? 0 : 100 confidence_threshold: ParsedCli.options[:"#{type}_version_all"] ? 0 : 100
} }
} }
end end
@@ -45,20 +61,23 @@ module WPScan
def enum_plugins def enum_plugins
opts = default_opts('plugins').merge( opts = default_opts('plugins').merge(
list: plugins_list_from_opts(parsed_options), list: plugins_list_from_opts(ParsedCli.options),
sort: true sort: true
) )
output('@info', msg: enum_message('plugins')) if user_interaction? output('@info', msg: enum_message('plugins', opts[:mode])) if user_interaction?
# Enumerate the plugins & find their versions to avoid doing that when #version # Enumerate the plugins & find their versions to avoid doing that when #version
# is called in the view # is called in the view
plugins = target.plugins(opts) plugins = target.plugins(opts)
output('@info', msg: 'Checking Plugin Versions') if user_interaction? && !plugins.empty? if user_interaction? && !plugins.empty?
output('@info',
msg: "Checking Plugin Versions #{enum_detection_message(opts[:version_detection][:mode])}")
end
plugins.each(&:version) plugins.each(&:version)
plugins.select!(&:vulnerable?) if parsed_options[:enumerate][:vulnerable_plugins] plugins.select!(&:vulnerable?) if ParsedCli.enumerate[:vulnerable_plugins]
output('plugins', plugins: plugins) output('plugins', plugins: plugins)
end end
@@ -88,20 +107,23 @@ module WPScan
def enum_themes def enum_themes
opts = default_opts('themes').merge( opts = default_opts('themes').merge(
list: themes_list_from_opts(parsed_options), list: themes_list_from_opts(ParsedCli.options),
sort: true sort: true
) )
output('@info', msg: enum_message('themes')) if user_interaction? output('@info', msg: enum_message('themes', opts[:mode])) if user_interaction?
# Enumerate the themes & find their versions to avoid doing that when #version # Enumerate the themes & find their versions to avoid doing that when #version
# is called in the view # is called in the view
themes = target.themes(opts) themes = target.themes(opts)
output('@info', msg: 'Checking Theme Versions') if user_interaction? && !themes.empty? if user_interaction? && !themes.empty?
output('@info',
msg: "Checking Theme Versions #{enum_detection_message(opts[:version_detection][:mode])}")
end
themes.each(&:version) themes.each(&:version)
themes.select!(&:vulnerable?) if parsed_options[:enumerate][:vulnerable_themes] themes.select!(&:vulnerable?) if ParsedCli.enumerate[:vulnerable_themes]
output('themes', themes: themes) output('themes', themes: themes)
end end
@@ -123,31 +145,33 @@ module WPScan
end end
def enum_timthumbs def enum_timthumbs
opts = default_opts('timthumbs').merge(list: parsed_options[:timthumbs_list]) opts = default_opts('timthumbs').merge(list: ParsedCli.timthumbs_list)
output('@info', msg: 'Enumerating Timthumbs') if user_interaction? output('@info', msg: "Enumerating Timthumbs #{enum_detection_message(opts[:mode])}") if user_interaction?
output('timthumbs', timthumbs: target.timthumbs(opts)) output('timthumbs', timthumbs: target.timthumbs(opts))
end end
def enum_config_backups def enum_config_backups
opts = default_opts('config_backups').merge(list: parsed_options[:config_backups_list]) opts = default_opts('config_backups').merge(list: ParsedCli.config_backups_list)
output('@info', msg: 'Enumerating Config Backups') if user_interaction? output('@info', msg: "Enumerating Config Backups #{enum_detection_message(opts[:mode])}") if user_interaction?
output('config_backups', config_backups: target.config_backups(opts)) output('config_backups', config_backups: target.config_backups(opts))
end end
def enum_db_exports def enum_db_exports
opts = default_opts('db_exports').merge(list: parsed_options[:db_exports_list]) opts = default_opts('db_exports').merge(list: ParsedCli.db_exports_list)
output('@info', msg: 'Enumerating DB Exports') if user_interaction? output('@info', msg: "Enumerating DB Exports #{enum_detection_message(opts[:mode])}") if user_interaction?
output('db_exports', db_exports: target.db_exports(opts)) output('db_exports', db_exports: target.db_exports(opts))
end end
def enum_medias def enum_medias
opts = default_opts('medias').merge(range: parsed_options[:enumerate][:medias]) opts = default_opts('medias').merge(range: ParsedCli.enumerate[:medias])
if user_interaction? if user_interaction?
output('@info', msg: 'Enumerating Medias (Permalink setting must be set to "Plain" for those to be detected)') output('@info',
msg: "Enumerating Medias #{enum_detection_message(opts[:mode])} "\
'(Permalink setting must be set to "Plain" for those to be detected)')
end end
output('medias', medias: target.medias(opts)) output('medias', medias: target.medias(opts))
@@ -157,16 +181,16 @@ module WPScan
# #
# @return [ Boolean ] Wether or not to enumerate the users # @return [ Boolean ] Wether or not to enumerate the users
def enum_users?(opts) def enum_users?(opts)
opts[:users] || (parsed_options[:passwords] && !parsed_options[:username] && !parsed_options[:usernames]) opts[:users] || (ParsedCli.passwords && !ParsedCli.username && !ParsedCli.usernames)
end end
def enum_users def enum_users
opts = default_opts('users').merge( opts = default_opts('users').merge(
range: enum_users_range, range: enum_users_range,
list: parsed_options[:users_list] list: ParsedCli.users_list
) )
output('@info', msg: 'Enumerating Users') if user_interaction? output('@info', msg: "Enumerating Users #{enum_detection_message(opts[:mode])}") if user_interaction?
output('users', users: target.users(opts)) output('users', users: target.users(opts))
end end
@@ -174,7 +198,7 @@ module WPScan
# If the --enumerate is used, the default value is handled by the Option # If the --enumerate is used, the default value is handled by the Option
# However, when using --passwords alone, the default has to be set by the code below # However, when using --passwords alone, the default has to be set by the code below
def enum_users_range def enum_users_range
parsed_options[:enumerate][:users] || cli_enum_choices[0].choices[:u].validate(nil) ParsedCli.enumerate[:users] || cli_enum_choices[0].choices[:u].validate(nil)
end end
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Main Theme Controller # Main Theme Controller
@@ -16,9 +18,9 @@ module WPScan
output( output(
'theme', 'theme',
theme: target.main_theme( theme: target.main_theme(
mode: parsed_options[:main_theme_detection] || parsed_options[:detection_mode] mode: ParsedCli.main_theme_detection || ParsedCli.detection_mode
), ),
verbose: parsed_options[:verbose] verbose: ParsedCli.verbose
) )
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Password Attack Controller # Password Attack Controller
@@ -22,7 +24,7 @@ module WPScan
end end
def run def run
return unless parsed_options[:passwords] return unless ParsedCli.passwords
if user_interaction? if user_interaction?
output('@info', output('@info',
@@ -31,13 +33,13 @@ module WPScan
attack_opts = { attack_opts = {
show_progression: user_interaction?, show_progression: user_interaction?,
multicall_max_passwords: parsed_options[:multicall_max_passwords] multicall_max_passwords: ParsedCli.multicall_max_passwords
} }
begin begin
found = [] found = []
attacker.attack(users, passwords(parsed_options[:passwords]), attack_opts) do |user| attacker.attack(users, passwords(ParsedCli.passwords), attack_opts) do |user|
found << user found << user
attacker.progress_bar.log("[SUCCESS] - #{user.username} / #{user.password}") attacker.progress_bar.log("[SUCCESS] - #{user.username} / #{user.password}")
@@ -52,21 +54,25 @@ module WPScan
@attacker ||= attacker_from_cli_options || attacker_from_automatic_detection @attacker ||= attacker_from_cli_options || attacker_from_automatic_detection
end end
# @return [ WPScan::XMLRPC ] # @return [ Model::XMLRPC ]
def xmlrpc def xmlrpc
@xmlrpc ||= target.xmlrpc @xmlrpc ||= target.xmlrpc
end end
# @return [ CMSScanner::Finders::Finder ] # @return [ CMSScanner::Finders::Finder ]
def attacker_from_cli_options def attacker_from_cli_options
return unless parsed_options[:password_attack] return unless ParsedCli.password_attack
case parsed_options[:password_attack] case ParsedCli.password_attack
when :wp_login when :wp_login
WPScan::Finders::Passwords::WpLogin.new(target) WPScan::Finders::Passwords::WpLogin.new(target)
when :xmlrpc when :xmlrpc
raise Error::XMLRPCNotDetected unless xmlrpc
WPScan::Finders::Passwords::XMLRPC.new(xmlrpc) WPScan::Finders::Passwords::XMLRPC.new(xmlrpc)
when :xmlrpc_multicall when :xmlrpc_multicall
raise Error::XMLRPCNotDetected unless xmlrpc
WPScan::Finders::Passwords::XMLRPCMulticall.new(xmlrpc) WPScan::Finders::Passwords::XMLRPCMulticall.new(xmlrpc)
end end
end end
@@ -88,10 +94,10 @@ module WPScan
# @return [ Array<Users> ] The users to brute force # @return [ Array<Users> ] The users to brute force
def users def users
return target.users unless parsed_options[:usernames] return target.users unless ParsedCli.usernames
parsed_options[:usernames].reduce([]) do |acc, elem| ParsedCli.usernames.reduce([]) do |acc, elem|
acc << CMSScanner::User.new(elem.chomp) acc << Model::User.new(elem.chomp)
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Controller module Controller
# Wp Version Controller # Wp Version Controller
@@ -22,8 +24,8 @@ module WPScan
output( output(
'version', 'version',
version: target.wp_version( version: target.wp_version(
mode: parsed_options[:wp_version_detection] || parsed_options[:detection_mode], mode: ParsedCli.wp_version_detection || ParsedCli.detection_mode,
confidence_threshold: parsed_options[:wp_version_all] ? 0 : 100, confidence_threshold: ParsedCli.wp_version_all ? 0 : 100,
show_progression: user_interaction? show_progression: user_interaction?
) )
) )

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'finders/interesting_findings' require_relative 'finders/interesting_findings'
require_relative 'finders/wp_items' require_relative 'finders/wp_items'
require_relative 'finders/wp_version' require_relative 'finders/wp_version'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'config_backups/known_filenames' require_relative 'config_backups/known_filenames'
module WPScan module WPScan

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module ConfigBackups module ConfigBackups
@@ -13,11 +15,10 @@ module WPScan
def aggressive(opts = {}) def aggressive(opts = {})
found = [] found = []
enumerate(potential_urls(opts), opts) do |res| enumerate(potential_urls(opts), opts.merge(check_full_response: 200)) do |res|
# Might need to improve that
next unless res.body =~ /define/i && res.body !~ /<\s?html/i next unless res.body =~ /define/i && res.body !~ /<\s?html/i
found << WPScan::ConfigBackup.new(res.request.url, found_by: DIRECT_ACCESS, confidence: 100) found << Model::ConfigBackup.new(res.request.url, found_by: DIRECT_ACCESS, confidence: 100)
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'db_exports/known_locations' require_relative 'db_exports/known_locations'
module WPScan module WPScan

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module DbExports module DbExports
@@ -6,6 +8,8 @@ module WPScan
class KnownLocations < CMSScanner::Finders::Finder class KnownLocations < CMSScanner::Finders::Finder
include CMSScanner::Finders::Finder::Enumerator include CMSScanner::Finders::Finder::Enumerator
SQL_PATTERN = /(?:DROP|(?:UN)?LOCK|CREATE) TABLE|INSERT INTO/.freeze
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ String ] :list # @option opts [ String ] :list
# @option opts [ Boolean ] :show_progression # @option opts [ Boolean ] :show_progression
@@ -14,15 +18,23 @@ module WPScan
def aggressive(opts = {}) def aggressive(opts = {})
found = [] found = []
enumerate(potential_urls(opts), opts) do |res| enumerate(potential_urls(opts), opts.merge(check_full_response: 200)) do |res|
next unless res.code == 200 && res.body =~ /INSERT INTO/ if res.effective_url.end_with?('.zip')
next unless res.headers['Content-Type'] =~ %r{\Aapplication/zip}i
else
next unless res.body =~ SQL_PATTERN
end
found << WPScan::DbExport.new(res.request.url, found_by: DIRECT_ACCESS, confidence: 100) found << Model::DbExport.new(res.request.url, found_by: DIRECT_ACCESS, confidence: 100)
end end
found found
end end
def full_request_params
@full_request_params ||= { headers: { 'Range' => 'bytes=0-3000' } }
end
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ String ] :list Mandatory # @option opts [ String ] :list Mandatory
# #

View File

@@ -1,4 +1,7 @@
# frozen_string_literal: true
require_relative 'interesting_findings/readme' require_relative 'interesting_findings/readme'
require_relative 'interesting_findings/wp_cron'
require_relative 'interesting_findings/multisite' require_relative 'interesting_findings/multisite'
require_relative 'interesting_findings/debug_log' require_relative 'interesting_findings/debug_log'
require_relative 'interesting_findings/backup_db' require_relative 'interesting_findings/backup_db'
@@ -23,7 +26,7 @@ module WPScan
%w[ %w[
Readme DebugLog FullPathDisclosure BackupDB DuplicatorInstallerLog Readme DebugLog FullPathDisclosure BackupDB DuplicatorInstallerLog
Multisite MuPlugins Registration UploadDirectoryListing TmmDbMigrate Multisite MuPlugins Registration UploadDirectoryListing TmmDbMigrate
UploadSQLDump EmergencyPwdResetScript UploadSQLDump EmergencyPwdResetScript WPCron
].each do |f| ].each do |f|
finders << InterestingFindings.const_get(f).new(target) finders << InterestingFindings.const_get(f).new(target)
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -6,13 +8,12 @@ module WPScan
# @return [ InterestingFinding ] # @return [ InterestingFinding ]
def aggressive(_opts = {}) def aggressive(_opts = {})
path = 'wp-content/backup-db/' path = 'wp-content/backup-db/'
url = target.url(path) res = target.head_and_get(path, [200, 403])
res = Browser.get(url)
return unless [200, 403].include?(res.code) && !target.homepage_or_404?(res) return unless [200, 403].include?(res.code) && !target.homepage_or_404?(res)
WPScan::BackupDB.new( Model::BackupDB.new(
url, target.url(path),
confidence: 70, confidence: 70,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,
interesting_entries: target.directory_listing_entries(path), interesting_entries: target.directory_listing_entries(path),

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -9,7 +11,7 @@ module WPScan
return unless target.debug_log?(path) return unless target.debug_log?(path)
WPScan::DebugLog.new( Model::DebugLog.new(
target.url(path), target.url(path),
confidence: 100, found_by: DIRECT_ACCESS, confidence: 100, found_by: DIRECT_ACCESS,
references: { url: 'https://codex.wordpress.org/Debugging_in_WordPress' } references: { url: 'https://codex.wordpress.org/Debugging_in_WordPress' }

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -5,13 +7,12 @@ module WPScan
class DuplicatorInstallerLog < CMSScanner::Finders::Finder class DuplicatorInstallerLog < CMSScanner::Finders::Finder
# @return [ InterestingFinding ] # @return [ InterestingFinding ]
def aggressive(_opts = {}) def aggressive(_opts = {})
url = target.url('installer-log.txt') path = 'installer-log.txt'
res = Browser.get(url)
return unless res.body =~ /DUPLICATOR INSTALL-LOG/ return unless target.head_and_get(path).body =~ /DUPLICATOR INSTALL-LOG/
WPScan::DuplicatorInstallerLog.new( Model::DuplicatorInstallerLog.new(
url, target.url(path),
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,
references: { url: 'https://www.exploit-db.com/ghdb/3981/' } references: { url: 'https://www.exploit-db.com/ghdb/3981/' }

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -5,14 +7,14 @@ module WPScan
class EmergencyPwdResetScript < CMSScanner::Finders::Finder class EmergencyPwdResetScript < CMSScanner::Finders::Finder
# @return [ InterestingFinding ] # @return [ InterestingFinding ]
def aggressive(_opts = {}) def aggressive(_opts = {})
url = target.url('/emergency.php') path = 'emergency.php'
res = Browser.get(url) res = target.head_and_get(path)
return unless res.code == 200 && !target.homepage_or_404?(res) return unless res.code == 200 && !target.homepage_or_404?(res)
WPScan::EmergencyPwdResetScript.new( Model::EmergencyPwdResetScript.new(
url, target.url(path),
confidence: res.body =~ /password/i ? 100 : 40, confidence: /password/i.match?(res.body) ? 100 : 40,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,
references: { references: {
url: 'https://codex.wordpress.org/Resetting_Your_Password#Using_the_Emergency_Password_Reset_Script' url: 'https://codex.wordpress.org/Resetting_Your_Password#Using_the_Emergency_Password_Reset_Script'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -10,7 +12,7 @@ module WPScan
return if fpd_entries.empty? return if fpd_entries.empty?
WPScan::FullPathDisclosure.new( Model::FullPathDisclosure.new(
target.url(path), target.url(path),
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -12,7 +14,9 @@ module WPScan
url = target.url('wp-content/mu-plugins/') url = target.url('wp-content/mu-plugins/')
return WPScan::MuPlugins.new( target.mu_plugins = true
return Model::MuPlugins.new(
url, url,
confidence: 70, confidence: 70,
found_by: 'URLs In Homepage (Passive Detection)', found_by: 'URLs In Homepage (Passive Detection)',
@@ -31,11 +35,9 @@ module WPScan
return unless [200, 401, 403].include?(res.code) return unless [200, 401, 403].include?(res.code)
return if target.homepage_or_404?(res) return if target.homepage_or_404?(res)
# TODO: add the check for --exclude-content once implemented ?
target.mu_plugins = true target.mu_plugins = true
WPScan::MuPlugins.new( Model::MuPlugins.new(
url, url,
confidence: 80, confidence: 80,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -15,7 +17,7 @@ module WPScan
target.multisite = true target.multisite = true
WPScan::Multisite.new( Model::Multisite.new(
url, url,
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -5,14 +7,14 @@ module WPScan
class Readme < CMSScanner::Finders::Finder class Readme < CMSScanner::Finders::Finder
# @return [ InterestingFinding ] # @return [ InterestingFinding ]
def aggressive(_opts = {}) def aggressive(_opts = {})
potential_files.each do |file| potential_files.each do |path|
url = target.url(file) res = target.head_and_get(path)
res = Browser.get(url)
if res.code == 200 && res.body =~ /wordpress/i next unless res.code == 200 && res.body =~ /wordpress/i
return WPScan::Readme.new(url, confidence: 100, found_by: DIRECT_ACCESS)
end return Model::Readme.new(target.url(path), confidence: 100, found_by: DIRECT_ACCESS)
end end
nil nil
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -18,7 +20,7 @@ module WPScan
target.registration_enabled = true target.registration_enabled = true
WPScan::Registration.new( Model::Registration.new(
res.effective_url, res.effective_url,
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -7,11 +9,11 @@ module WPScan
def aggressive(_opts = {}) def aggressive(_opts = {})
path = 'wp-content/uploads/tmm_db_migrate/tmm_db_migrate.zip' path = 'wp-content/uploads/tmm_db_migrate/tmm_db_migrate.zip'
url = target.url(path) url = target.url(path)
res = Browser.get(url) res = browser.forge_request(url, target.head_or_get_request_params).run
return unless res.code == 200 && res.headers['Content-Type'] =~ %r{\Aapplication/zip}i return unless res.code == 200 && res.headers['Content-Type'] =~ %r{\Aapplication/zip}i
WPScan::TmmDbMigrate.new( Model::TmmDbMigrate.new(
url, url,
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
@@ -11,7 +13,7 @@ module WPScan
url = target.url(path) url = target.url(path)
WPScan::UploadDirectoryListing.new( Model::UploadDirectoryListing.new(
url, url,
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS, found_by: DIRECT_ACCESS,

View File

@@ -1,27 +1,25 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module InterestingFindings module InterestingFindings
# UploadSQLDump finder # UploadSQLDump finder
class UploadSQLDump < CMSScanner::Finders::Finder class UploadSQLDump < CMSScanner::Finders::Finder
SQL_PATTERN = /(?:(?:(?:DROP|CREATE) TABLE)|INSERT INTO)/.freeze SQL_PATTERN = /(?:DROP|CREATE|(?:UN)?LOCK) TABLE|INSERT INTO/.freeze
# @return [ InterestingFinding ] # @return [ InterestingFinding ]
def aggressive(_opts = {}) def aggressive(_opts = {})
url = dump_url path = 'wp-content/uploads/dump.sql'
res = Browser.get(url) res = target.head_and_get(path, [200], get: { headers: { 'Range' => 'bytes=0-3000' } })
return unless res.code == 200 && res.body =~ SQL_PATTERN return unless res.body =~ SQL_PATTERN
WPScan::UploadSQLDump.new( Model::UploadSQLDump.new(
url, target.url(path),
confidence: 100, confidence: 100,
found_by: DIRECT_ACCESS found_by: DIRECT_ACCESS
) )
end end
def dump_url
target.url('wp-content/uploads/dump.sql')
end
end end
end end
end end

View File

@@ -0,0 +1,33 @@
# frozen_string_literal: true
module WPScan
module Finders
module InterestingFindings
# wp-cron.php finder
class WPCron < CMSScanner::Finders::Finder
# @return [ InterestingFinding ]
def aggressive(_opts = {})
res = Browser.get(wp_cron_url)
return unless res.code == 200
Model::WPCron.new(
wp_cron_url,
confidence: 60,
found_by: DIRECT_ACCESS,
references: {
url: [
'https://www.iplocation.net/defend-wordpress-from-ddos',
'https://github.com/wpscanteam/wpscan/issues/1299'
]
}
)
end
def wp_cron_url
@wp_cron_url ||= target.url('wp-cron.php')
end
end
end
end
end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'main_theme/css_style' require_relative 'main_theme/css_style'
require_relative 'main_theme/woo_framework_meta_generator' require_relative 'main_theme/woo_framework_meta_generator'
require_relative 'main_theme/urls_in_homepage' require_relative 'main_theme/urls_in_homepage'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module MainTheme module MainTheme
@@ -6,7 +8,7 @@ module WPScan
include Finders::WpItems::URLsInHomepage include Finders::WpItems::URLsInHomepage
def create_theme(slug, style_url, opts) def create_theme(slug, style_url, opts)
WPScan::Theme.new( Model::Theme.new(
slug, slug,
target, target,
opts.merge(found_by: found_by, confidence: 70, style_url: style_url) opts.merge(found_by: found_by, confidence: 70, style_url: style_url)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module MainTheme module MainTheme
@@ -14,7 +16,7 @@ module WPScan
slugs = items_from_links('themes', false) + items_from_codes('themes', false) slugs = items_from_links('themes', false) + items_from_codes('themes', false)
slugs.each_with_object(Hash.new(0)) { |slug, counts| counts[slug] += 1 }.each do |slug, occurences| slugs.each_with_object(Hash.new(0)) { |slug, counts| counts[slug] += 1 }.each do |slug, occurences|
found << WPScan::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 2 * occurences)) found << Model::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 2 * occurences))
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module MainTheme module MainTheme
@@ -10,7 +12,7 @@ module WPScan
def passive(opts = {}) def passive(opts = {})
return unless target.homepage_res.body =~ PATTERN return unless target.homepage_res.body =~ PATTERN
WPScan::Theme.new( Model::Theme.new(
Regexp.last_match[1], Regexp.last_match[1],
target, target,
opts.merge(found_by: found_by, confidence: 80) opts.merge(found_by: found_by, confidence: 80)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'medias/attachment_brute_forcing' require_relative 'medias/attachment_brute_forcing'
module WPScan module WPScan

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Medias module Medias
@@ -15,7 +17,7 @@ module WPScan
enumerate(target_urls(opts), opts) do |res| enumerate(target_urls(opts), opts) do |res|
next unless res.code == 200 next unless res.code == 200
found << WPScan::Media.new(res.effective_url, opts.merge(found_by: found_by, confidence: 100)) found << Model::Media.new(res.effective_url, opts.merge(found_by: found_by, confidence: 100))
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'passwords/wp_login' require_relative 'passwords/wp_login'
require_relative 'passwords/xml_rpc' require_relative 'passwords/xml_rpc'
require_relative 'passwords/xml_rpc_multicall' require_relative 'passwords/xml_rpc_multicall'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Passwords module Passwords
@@ -10,7 +12,8 @@ module WPScan
end end
def valid_credentials?(response) def valid_credentials?(response)
response.code == 302 response.code == 302 &&
response.headers['Set-Cookie']&.any? { |cookie| cookie =~ /wordpress_logged_in_/i }
end end
def errored_response?(response) def errored_response?(response)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Passwords module Passwords

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Passwords module Passwords
@@ -20,13 +22,13 @@ module WPScan
target.multi_call(methods).run target.multi_call(methods).run
end end
# @param [ Array<CMSScanner::User> ] users # @param [ Array<Model::User> ] users
# @param [ Array<String> ] passwords # @param [ Array<String> ] passwords
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ Boolean ] :show_progression # @option opts [ Boolean ] :show_progression
# @option opts [ Integer ] :multicall_max_passwords # @option opts [ Integer ] :multicall_max_passwords
# #
# @yield [ CMSScanner::User ] When a valid combination is found # @yield [ Model::User ] When a valid combination is found
# #
# TODO: Make rubocop happy about metrics etc # TODO: Make rubocop happy about metrics etc
# #

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'plugin_version/readme' require_relative 'plugin_version/readme'
module WPScan module WPScan
@@ -7,7 +9,7 @@ module WPScan
class Base class Base
include CMSScanner::Finders::UniqueFinder include CMSScanner::Finders::UniqueFinder
# @param [ WPScan::Plugin ] plugin # @param [ Model::Plugin ] plugin
def initialize(plugin) def initialize(plugin)
finders << PluginVersion::Readme.new(plugin) finders << PluginVersion::Readme.new(plugin)
@@ -16,7 +18,7 @@ module WPScan
# Load the finders associated with the plugin # Load the finders associated with the plugin
# #
# @param [ WPScan::Plugin ] plugin # @param [ Model::Plugin ] plugin
def load_specific_finders(plugin) def load_specific_finders(plugin)
module_name = plugin.classify module_name = plugin.classify

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module PluginVersion module PluginVersion
@@ -7,21 +9,23 @@ module WPScan
def aggressive(_opts = {}) def aggressive(_opts = {})
found_by_msg = 'Readme - %s (Aggressive Detection)' found_by_msg = 'Readme - %s (Aggressive Detection)'
WPScan::WpItem::READMES.each do |file| # The target(plugin)#readme_url can't be used directly here
url = target.url(file) # as if the --detection-mode is passive, it will always return nil
res = Browser.get(url) Model::WpItem::READMES.each do |file|
res = target.head_and_get(file)
next unless res.code == 200 && !(numbers = version_numbers(res.body)).empty? next unless res.code == 200 && !(numbers = version_numbers(res.body)).empty?
return numbers.reduce([]) do |a, e| return numbers.reduce([]) do |a, e|
a << WPScan::Version.new( a << Model::Version.new(
e[0], e[0],
found_by: format(found_by_msg, e[1]), found_by: format(found_by_msg, e[1]),
confidence: e[2], confidence: e[2],
interesting_entries: [url] interesting_entries: [res.effective_url]
) )
end end
end end
nil nil
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'plugins/urls_in_homepage' require_relative 'plugins/urls_in_homepage'
require_relative 'plugins/known_locations' require_relative 'plugins/known_locations'
# From the DynamicFinders # From the DynamicFinders

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -15,7 +17,7 @@ module WPScan
def process_response(opts, response, slug, klass, config) def process_response(opts, response, slug, klass, config)
return unless response.body =~ config['pattern'] return unless response.body =~ config['pattern']
Plugin.new( Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -18,7 +20,7 @@ module WPScan
next unless comment =~ config['pattern'] next unless comment =~ config['pattern']
return Plugin.new( return Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -19,7 +21,7 @@ module WPScan
# when checking for plugins # when checking for plugins
# #
Plugin.new( Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -18,7 +20,7 @@ module WPScan
configs.each do |klass, config| configs.each do |klass, config|
next unless headers[config['header']] && headers[config['header']].to_s =~ config['pattern'] next unless headers[config['header']] && headers[config['header']].to_s =~ config['pattern']
found << Plugin.new( found << Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -16,7 +18,7 @@ module WPScan
response.html.xpath(config['xpath'] || '//script[not(@src)]').each do |node| response.html.xpath(config['xpath'] || '//script[not(@src)]').each do |node|
next if config['pattern'] && !node.text.match(config['pattern']) next if config['pattern'] && !node.text.match(config['pattern'])
return Plugin.new( return Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -5,6 +7,11 @@ module WPScan
class KnownLocations < CMSScanner::Finders::Finder class KnownLocations < CMSScanner::Finders::Finder
include CMSScanner::Finders::Finder::Enumerator include CMSScanner::Finders::Finder::Enumerator
# @return [ Array<Integer> ]
def valid_response_codes
@valid_response_codes ||= [200, 401, 403, 301, 500].freeze
end
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ String ] :list # @option opts [ String ] :list
# #
@@ -12,12 +19,8 @@ module WPScan
def aggressive(opts = {}) def aggressive(opts = {})
found = [] found = []
enumerate(target_urls(opts), opts) do |res, slug| enumerate(target_urls(opts), opts.merge(check_full_response: [200, 401, 403, 500])) do |_res, slug|
# TODO: follow the location (from enumerate()) and remove the 301 here ? found << Model::Plugin.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
# As a result, it might remove false positive due to redirection to the homepage
next unless [200, 401, 403, 301].include?(res.code)
found << WPScan::Plugin.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
end end
found found
@@ -30,10 +33,9 @@ module WPScan
def target_urls(opts = {}) def target_urls(opts = {})
slugs = opts[:list] || DB::Plugins.vulnerable_slugs slugs = opts[:list] || DB::Plugins.vulnerable_slugs
urls = {} urls = {}
plugins_url = target.plugins_url
slugs.each do |slug| slugs.each do |slug|
urls["#{plugins_url}#{URI.encode(slug)}/"] = slug urls[target.plugin_url(slug)] = slug
end end
urls urls

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -14,7 +16,7 @@ module WPScan
found = [] found = []
(items_from_links('plugins') + items_from_codes('plugins')).uniq.sort.each do |slug| (items_from_links('plugins') + items_from_codes('plugins')).uniq.sort.each do |slug|
found << Plugin.new(slug, target, opts.merge(found_by: found_by, confidence: 80)) found << Model::Plugin.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Plugins module Plugins
@@ -16,7 +18,7 @@ module WPScan
response.html.xpath(config['xpath']).each do |node| response.html.xpath(config['xpath']).each do |node|
next if config['pattern'] && !node.text.match(config['pattern']) next if config['pattern'] && !node.text.match(config['pattern'])
return Plugin.new( return Model::Plugin.new(
slug, slug,
target, target,
opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE) opts.merge(found_by: found_by(klass), confidence: config['confidence'] || DEFAULT_CONFIDENCE)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'theme_version/style' require_relative 'theme_version/style'
require_relative 'theme_version/woo_framework_meta_generator' require_relative 'theme_version/woo_framework_meta_generator'
@@ -8,7 +10,7 @@ module WPScan
class Base class Base
include CMSScanner::Finders::UniqueFinder include CMSScanner::Finders::UniqueFinder
# @param [ WPScan::Theme ] theme # @param [ Model::Theme ] theme
def initialize(theme) def initialize(theme)
finders << finders <<
ThemeVersion::Style.new(theme) << ThemeVersion::Style.new(theme) <<
@@ -19,7 +21,7 @@ module WPScan
# Load the finders associated with the theme # Load the finders associated with the theme
# #
# @param [ WPScan::Theme ] theme # @param [ Model::Theme ] theme
def load_specific_finders(theme) def load_specific_finders(theme)
module_name = theme.classify module_name = theme.classify

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module ThemeVersion module ThemeVersion
@@ -30,7 +32,7 @@ module WPScan
def style_version def style_version
return unless Browser.get(target.style_url).body =~ /Version:[\t ]*(?!trunk)([0-9a-z\.-]+)/i return unless Browser.get(target.style_url).body =~ /Version:[\t ]*(?!trunk)([0-9a-z\.-]+)/i
WPScan::Version.new( Model::Version.new(
Regexp.last_match[1], Regexp.last_match[1],
found_by: found_by, found_by: found_by,
confidence: 80, confidence: 80,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module ThemeVersion module ThemeVersion
@@ -11,7 +13,7 @@ module WPScan
return unless Regexp.last_match[1] == target.slug return unless Regexp.last_match[1] == target.slug
WPScan::Version.new(Regexp.last_match[2], found_by: found_by, confidence: 80) Model::Version.new(Regexp.last_match[2], found_by: found_by, confidence: 80)
end end
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'themes/urls_in_homepage' require_relative 'themes/urls_in_homepage'
require_relative 'themes/known_locations' require_relative 'themes/known_locations'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Themes module Themes
@@ -5,6 +7,11 @@ module WPScan
class KnownLocations < CMSScanner::Finders::Finder class KnownLocations < CMSScanner::Finders::Finder
include CMSScanner::Finders::Finder::Enumerator include CMSScanner::Finders::Finder::Enumerator
# @return [ Array<Integer> ]
def valid_response_codes
@valid_response_codes ||= [200, 401, 403, 301, 500].freeze
end
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ String ] :list # @option opts [ String ] :list
# #
@@ -12,12 +19,8 @@ module WPScan
def aggressive(opts = {}) def aggressive(opts = {})
found = [] found = []
enumerate(target_urls(opts), opts) do |res, slug| enumerate(target_urls(opts), opts.merge(check_full_response: [200, 401, 403, 500])) do |_res, slug|
# TODO: follow the location (from enumerate()) and remove the 301 here ? found << Model::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
# As a result, it might remove false positive due to redirection to the homepage
next unless [200, 401, 403, 301].include?(res.code)
found << WPScan::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
end end
found found
@@ -30,10 +33,9 @@ module WPScan
def target_urls(opts = {}) def target_urls(opts = {})
slugs = opts[:list] || DB::Themes.vulnerable_slugs slugs = opts[:list] || DB::Themes.vulnerable_slugs
urls = {} urls = {}
themes_url = target.url('wp-content/themes/')
slugs.each do |slug| slugs.each do |slug|
urls["#{themes_url}#{URI.encode(slug)}/"] = slug urls[target.theme_url(slug)] = slug
end end
urls urls

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Themes module Themes
@@ -12,7 +14,7 @@ module WPScan
found = [] found = []
(items_from_links('themes') + items_from_codes('themes')).uniq.sort.each do |slug| (items_from_links('themes') + items_from_codes('themes')).uniq.sort.each do |slug|
found << WPScan::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 80)) found << Model::Theme.new(slug, target, opts.merge(found_by: found_by, confidence: 80))
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'timthumb_version/bad_request' require_relative 'timthumb_version/bad_request'
module WPScan module WPScan
@@ -7,7 +9,7 @@ module WPScan
class Base class Base
include CMSScanner::Finders::UniqueFinder include CMSScanner::Finders::UniqueFinder
# @param [ WPScan::Timthumb ] target # @param [ Model::Timthumb ] target
def initialize(target) def initialize(target)
finders << TimthumbVersion::BadRequest.new(target) finders << TimthumbVersion::BadRequest.new(target)
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module TimthumbVersion module TimthumbVersion
@@ -8,7 +10,7 @@ module WPScan
def aggressive(_opts = {}) def aggressive(_opts = {})
return unless Browser.get(target.url).body =~ /(TimThumb version\s*: ([^<]+))/ return unless Browser.get(target.url).body =~ /(TimThumb version\s*: ([^<]+))/
WPScan::Version.new( Model::Version.new(
Regexp.last_match[2], Regexp.last_match[2],
found_by: 'Bad Request (Aggressive Detection)', found_by: 'Bad Request (Aggressive Detection)',
confidence: 90, confidence: 90,

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'timthumbs/known_locations' require_relative 'timthumbs/known_locations'
module WPScan module WPScan

View File

@@ -1,10 +1,19 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Timthumbs module Timthumbs
# Known Locations Timthumbs Finder # Known Locations Timthumbs Finder
# Note: A vulnerable version, 2.8.13 can be found here:
# https://github.com/GabrielGil/TimThumb/blob/980c3d6a823477761570475e8b83d3e9fcd2d7ae/timthumb.php
class KnownLocations < CMSScanner::Finders::Finder class KnownLocations < CMSScanner::Finders::Finder
include CMSScanner::Finders::Finder::Enumerator include CMSScanner::Finders::Finder::Enumerator
# @return [ Array<Integer> ]
def valid_response_codes
@valid_response_codes ||= [400]
end
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ String ] :list Mandatory # @option opts [ String ] :list Mandatory
# #
@@ -12,10 +21,10 @@ module WPScan
def aggressive(opts = {}) def aggressive(opts = {})
found = [] found = []
enumerate(target_urls(opts), opts) do |res| enumerate(target_urls(opts), opts.merge(check_full_response: 400)) do |res|
next unless res.code == 400 && res.body =~ /no image specified/i next unless res.body =~ /no image specified/i
found << WPScan::Timthumb.new(res.request.url, opts.merge(found_by: found_by, confidence: 100)) found << Model::Timthumb.new(res.request.url, opts.merge(found_by: found_by, confidence: 100))
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'users/author_posts' require_relative 'users/author_posts'
require_relative 'users/wp_json_api' require_relative 'users/wp_json_api'
require_relative 'users/oembed_api' require_relative 'users/oembed_api'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -5,6 +7,11 @@ module WPScan
class AuthorIdBruteForcing < CMSScanner::Finders::Finder class AuthorIdBruteForcing < CMSScanner::Finders::Finder
include CMSScanner::Finders::Finder::Enumerator include CMSScanner::Finders::Finder::Enumerator
# @return [ Array<Integer> ]
def valid_response_codes
@valid_response_codes ||= [200, 301, 302]
end
# @param [ Hash ] opts # @param [ Hash ] opts
# @option opts [ Range ] :range Mandatory # @option opts [ Range ] :range Mandatory
# #
@@ -13,12 +20,12 @@ module WPScan
found = [] found = []
found_by_msg = 'Author Id Brute Forcing - %s (Aggressive Detection)' found_by_msg = 'Author Id Brute Forcing - %s (Aggressive Detection)'
enumerate(target_urls(opts), opts) do |res, id| enumerate(target_urls(opts), opts.merge(check_full_response: true)) do |res, id|
username, found_by, confidence = potential_username(res) username, found_by, confidence = potential_username(res)
next unless username next unless username
found << CMSScanner::User.new( found << Model::User.new(
username, username,
id: id, id: id,
found_by: format(found_by_msg, found_by), found_by: format(found_by_msg, found_by),
@@ -47,7 +54,7 @@ module WPScan
super(opts.merge(title: ' Brute Forcing Author IDs -')) super(opts.merge(title: ' Brute Forcing Author IDs -'))
end end
def request_params def full_request_params
{ followlocation: true } { followlocation: true }
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -10,7 +12,7 @@ module WPScan
found_by_msg = 'Author Posts - %s (Passive Detection)' found_by_msg = 'Author Posts - %s (Passive Detection)'
usernames(opts).reduce([]) do |a, e| usernames(opts).reduce([]) do |a, e|
a << CMSScanner::User.new( a << Model::User.new(
e[0], e[0],
found_by: format(found_by_msg, e[1]), found_by: format(found_by_msg, e[1]),
confidence: e[2] confidence: e[2]
@@ -48,7 +50,7 @@ module WPScan
if uri.path =~ %r{/author/([^/\b]+)/?\z}i if uri.path =~ %r{/author/([^/\b]+)/?\z}i
usernames << [Regexp.last_match[1], 'Author Pattern', 100] usernames << [Regexp.last_match[1], 'Author Pattern', 100]
elsif uri.query =~ /author=[0-9]+/ elsif /author=[0-9]+/.match?(uri.query)
usernames << [node.text.to_s.strip, 'Display Name', 30] usernames << [node.text.to_s.strip, 'Display Name', 30]
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -24,7 +26,7 @@ module WPScan
next unless error =~ /The password you entered for the username|Incorrect Password/i next unless error =~ /The password you entered for the username|Incorrect Password/i
found << CMSScanner::User.new(username, found_by: found_by, confidence: 100) found << Model::User.new(username, found_by: found_by, confidence: 100)
end end
found found

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -21,7 +23,7 @@ module WPScan
return [] unless details return [] unless details
[CMSScanner::User.new(details[0], [Model::User.new(details[0],
found_by: format(found_by_msg, details[1]), found_by: format(found_by_msg, details[1]),
confidence: details[2], confidence: details[2],
interesting_entries: [api_url])] interesting_entries: [api_url])]

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -17,20 +19,20 @@ module WPScan
begin begin
res.xml.xpath('//item/dc:creator').each do |node| res.xml.xpath('//item/dc:creator').each do |node|
potential_username = node.text.to_s username = node.text.to_s
# Ignoring potential username longer than 60 characters and containing accents # Ignoring potential username longer than 60 characters and containing accents
# as they are considered invalid. See https://github.com/wpscanteam/wpscan/issues/1215 # as they are considered invalid. See https://github.com/wpscanteam/wpscan/issues/1215
next if potential_username.length > 60 || potential_username =~ /[^\x00-\x7F]/ next if username.strip.empty? || username.length > 60 || username =~ /[^\x00-\x7F]/
potential_usernames << potential_username potential_usernames << username
end end
rescue Nokogiri::XML::XPath::SyntaxError rescue Nokogiri::XML::XPath::SyntaxError
next next
end end
potential_usernames.uniq.each do |potential_username| potential_usernames.uniq.each do |username|
found << CMSScanner::User.new(potential_username, found_by: found_by, confidence: 50) found << Model::User.new(username, found_by: found_by, confidence: 50)
end end
break break

View File

@@ -1,23 +1,34 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
# WP JSON API # WP JSON API
# #
# Since 4.7 - Need more investigation as it seems WP 4.7.1 reduces the exposure, see https://github.com/wpscanteam/wpscan/issues/1038) # Since 4.7 - Need more investigation as it seems WP 4.7.1 reduces the exposure, see https://github.com/wpscanteam/wpscan/issues/1038)
# For the pagination, see https://github.com/wpscanteam/wpscan/issues/1285
# #
class WpJsonApi < CMSScanner::Finders::Finder class WpJsonApi < CMSScanner::Finders::Finder
MAX_PER_PAGE = 100 # See https://developer.wordpress.org/rest-api/using-the-rest-api/pagination/
# @param [ Hash ] opts # @param [ Hash ] opts
# #
# @return [ Array<User> ] # @return [ Array<User> ]
def aggressive(_opts = {}) def aggressive(_opts = {})
found = [] found = []
current_page = 0
JSON.parse(Browser.get(api_url).body)&.each do |user| loop do
found << CMSScanner::User.new(user['slug'], current_page += 1
id: user['id'],
found_by: found_by, res = Typhoeus.get(api_url, params: { per_page: MAX_PER_PAGE, page: current_page })
confidence: 100,
interesting_entries: [api_url]) total_pages ||= res.headers['X-WP-TotalPages'].to_i
users_in_page = users_from_response(res)
found += users_in_page
break if current_page >= total_pages || users_in_page.empty?
end end
found found
@@ -25,9 +36,34 @@ module WPScan
found found
end end
# @param [ Typhoeus::Response ] response
#
# @return [ Array<User> ] The users from the response
def users_from_response(response)
found = []
JSON.parse(response.body)&.each do |user|
found << Model::User.new(user['slug'],
id: user['id'],
found_by: found_by,
confidence: 100,
interesting_entries: [response.effective_url])
end
found
end
# @return [ String ] The URL of the API listing the Users # @return [ String ] The URL of the API listing the Users
def api_url def api_url
@api_url ||= target.url('wp-json/wp/v2/users/') return @api_url if @api_url
target.in_scope_urls(target.homepage_res, "//link[@rel='https://api.w.org/']/@href").each do |url, _tag|
uri = Addressable::URI.parse(url.strip)
return @api_url = uri.join('wp/v2/users/').to_s if uri.path.include?('wp-json')
end
@api_url = target.url('wp-json/wp/v2/users/')
end end
end end
end end

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module Users module Users
@@ -15,7 +17,7 @@ module WPScan
next unless username && !username.strip.empty? next unless username && !username.strip.empty?
found << CMSScanner::User.new(username, found << Model::User.new(username,
found_by: found_by, found_by: found_by,
confidence: 100, confidence: 100,
interesting_entries: [sitemap_url]) interesting_entries: [sitemap_url])

View File

@@ -1 +1,3 @@
# frozen_string_literal: true
require_relative 'wp_items/urls_in_homepage' require_relative 'wp_items/urls_in_homepage'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpItems module WpItems

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
require_relative 'wp_version/rss_generator' require_relative 'wp_version/rss_generator'
require_relative 'wp_version/atom_generator' require_relative 'wp_version/atom_generator'
require_relative 'wp_version/rdf_generator' require_relative 'wp_version/rdf_generator'

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpVersion module WpVersion

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpVersion module WpVersion

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpVersion module WpVersion
@@ -13,9 +15,9 @@ module WPScan
number = Regexp.last_match(1) number = Regexp.last_match(1)
return unless WPScan::WpVersion.valid?(number) return unless Model::WpVersion.valid?(number)
WPScan::WpVersion.new( Model::WpVersion.new(
number, number,
found_by: 'Readme (Aggressive Detection)', found_by: 'Readme (Aggressive Detection)',
# Since WP 4.7, the Readme only contains the major version (ie 4.7, 4.8 etc) # Since WP 4.7, the Readme only contains the major version (ie 4.7, 4.8 etc)

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpVersion module WpVersion

View File

@@ -1,3 +1,5 @@
# frozen_string_literal: true
module WPScan module WPScan
module Finders module Finders
module WpVersion module WpVersion
@@ -11,7 +13,7 @@ module WPScan
hydra.abort hydra.abort
progress_bar.finish progress_bar.finish
return WPScan::WpVersion.new( return Model::WpVersion.new(
version_number, version_number,
found_by: 'Unique Fingerprinting (Aggressive Detection)', found_by: 'Unique Fingerprinting (Aggressive Detection)',
confidence: 100, confidence: 100,

View File

@@ -1,3 +1,11 @@
# frozen_string_literal: true
module WPScan
module Model
include CMSScanner::Model
end
end
require_relative 'models/interesting_finding' require_relative 'models/interesting_finding'
require_relative 'models/wp_version' require_relative 'models/wp_version'
require_relative 'models/xml_rpc' require_relative 'models/xml_rpc'

View File

@@ -1,5 +1,9 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# Config Backup # Config Backup
class ConfigBackup < InterestingFinding class ConfigBackup < InterestingFinding
end end
end
end end

View File

@@ -1,5 +1,9 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# DB Export # DB Export
class DbExport < InterestingFinding class DbExport < InterestingFinding
end end
end
end end

View File

@@ -1,6 +1,9 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# Custom class to include the WPScan::References module # Custom class to include the WPScan::References module
class InterestingFinding < CMSScanner::InterestingFinding class InterestingFinding < CMSScanner::Model::InterestingFinding
include References include References
end end
@@ -42,4 +45,8 @@ module WPScan
class UploadSQLDump < InterestingFinding class UploadSQLDump < InterestingFinding
end end
class WPCron < InterestingFinding
end
end
end end

View File

@@ -1,5 +1,9 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# Media # Media
class Media < InterestingFinding class Media < InterestingFinding
end end
end
end end

View File

@@ -1,25 +1,33 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# WordPress Plugin # WordPress Plugin
class Plugin < WpItem class Plugin < WpItem
# See WpItem # See WpItem
def initialize(slug, blog, opts = {}) def initialize(slug, blog, opts = {})
super(slug, blog, opts) super(slug, blog, opts)
@uri = Addressable::URI.parse(blog.url("wp-content/plugins/#{slug}/")) # To be used by #head_and_get
# If custom wp-content, it will be replaced by blog#url
@path_from_blog = "wp-content/plugins/#{slug}/"
@uri = Addressable::URI.parse(blog.url(path_from_blog))
end end
# @return [ JSON ] # @return [ JSON ]
def db_data def db_data
DB::Plugin.db_data(slug) @db_data ||= DB::Plugin.db_data(slug)
end end
# @param [ Hash ] opts # @param [ Hash ] opts
# #
# @return [ WPScan::Version, false ] # @return [ Model::Version, false ]
def version(opts = {}) def version(opts = {})
@version = Finders::PluginVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil? @version = Finders::PluginVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil?
@version @version
end end
end end
end
end end

View File

@@ -1,4 +1,7 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# WordPress Theme # WordPress Theme
class Theme < WpItem class Theme < WpItem
attr_reader :style_url, :style_name, :style_uri, :author, :author_uri, :template, :description, attr_reader :style_url, :style_name, :style_uri, :author, :author_uri, :template, :description,
@@ -8,7 +11,11 @@ module WPScan
def initialize(slug, blog, opts = {}) def initialize(slug, blog, opts = {})
super(slug, blog, opts) super(slug, blog, opts)
@uri = Addressable::URI.parse(blog.url("wp-content/themes/#{slug}/")) # To be used by #head_and_get
# If custom wp-content, it will be replaced by blog#url
@path_from_blog = "wp-content/themes/#{slug}/"
@uri = Addressable::URI.parse(blog.url(path_from_blog))
@style_url = opts[:style_url] || url('style.css') @style_url = opts[:style_url] || url('style.css')
parse_style parse_style
@@ -16,12 +23,12 @@ module WPScan
# @return [ JSON ] # @return [ JSON ]
def db_data def db_data
DB::Theme.db_data(slug) @db_data ||= DB::Theme.db_data(slug)
end end
# @param [ Hash ] opts # @param [ Hash ] opts
# #
# @return [ WPScan::Version, false ] # @return [ Model::Version, false ]
def version(opts = {}) def version(opts = {})
@version = Finders::ThemeVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil? @version = Finders::ThemeVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil?
@@ -96,4 +103,5 @@ module WPScan
super(other) && style_url == other.style_url super(other) && style_url == other.style_url
end end
end end
end
end end

View File

@@ -1,4 +1,7 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# Timthumb # Timthumb
class Timthumb < InterestingFinding class Timthumb < InterestingFinding
include Vulnerable include Vulnerable
@@ -16,7 +19,7 @@ module WPScan
# @param [ Hash ] opts # @param [ Hash ] opts
# #
# @return [ WPScan::Version, false ] # @return [ Model::Version, false ]
def version(opts = {}) def version(opts = {})
@version = Finders::TimthumbVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil? @version = Finders::TimthumbVersion::Base.find(self, version_detection_opts.merge(opts)) if @version.nil?
@@ -60,7 +63,7 @@ module WPScan
def webshot_enabled? def webshot_enabled?
res = Browser.get(url, params: { webshot: 1, src: "http://#{default_allowed_domains.sample}" }) res = Browser.get(url, params: { webshot: 1, src: "http://#{default_allowed_domains.sample}" })
res.body =~ /WEBSHOT_ENABLED == true/ ? false : true /WEBSHOT_ENABLED == true/.match?(res.body) ? false : true
end end
# @return [ Array<String> ] The default allowed domains (between the 2.0 and 2.8.13) # @return [ Array<String> ] The default allowed domains (between the 2.0 and 2.8.13)
@@ -68,4 +71,5 @@ module WPScan
%w[flickr.com picasa.com img.youtube.com upload.wikimedia.org] %w[flickr.com picasa.com img.youtube.com upload.wikimedia.org]
end end
end end
end
end end

View File

@@ -1,4 +1,7 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# WpItem (superclass of Plugin & Theme) # WpItem (superclass of Plugin & Theme)
class WpItem class WpItem
include Vulnerable include Vulnerable
@@ -7,11 +10,10 @@ module WPScan
include CMSScanner::Target::Server::Generic include CMSScanner::Target::Server::Generic
READMES = %w[readme.txt README.txt README.md readme.md Readme.txt].freeze READMES = %w[readme.txt README.txt README.md readme.md Readme.txt].freeze
CHANGELOGS = %w[changelog.txt CHANGELOG.md changelog.md].freeze
attr_reader :uri, :slug, :detection_opts, :version_detection_opts, :blog, :db_data attr_reader :uri, :slug, :detection_opts, :version_detection_opts, :blog, :path_from_blog, :db_data
delegate :homepage_res, :xpath_pattern_from_page, :in_scope_urls, to: :blog delegate :homepage_res, :xpath_pattern_from_page, :in_scope_urls, :head_or_get_params, to: :blog
# @param [ String ] slug The plugin/theme slug # @param [ String ] slug The plugin/theme slug
# @param [ Target ] blog The targeted blog # @param [ Target ] blog The targeted blog
@@ -57,7 +59,7 @@ module WPScan
# @return [ String ] # @return [ String ]
def latest_version def latest_version
@latest_version ||= db_data['latest_version'] ? WPScan::Version.new(db_data['latest_version']) : nil @latest_version ||= db_data['latest_version'] ? Model::Version.new(db_data['latest_version']) : nil
end end
# Not used anywhere ATM # Not used anywhere ATM
@@ -109,30 +111,19 @@ module WPScan
@classify ||= classify_slug(slug) @classify ||= classify_slug(slug)
end end
# @return [ String ] The readme url if found # @return [ String, False ] The readme url if found, false otherwise
def readme_url def readme_url
return if detection_opts[:mode] == :passive return if detection_opts[:mode] == :passive
if @readme_url.nil? return @readme_url unless @readme_url.nil?
READMES.each do |path| READMES.each do |path|
return @readme_url = url(path) if Browser.get(url(path)).code == 200 t_url = url(path)
end
return @readme_url = t_url if Browser.forge_request(t_url, blog.head_or_get_params).run.code == 200
end end
@readme_url @readme_url = false
end
# @return [ String, false ] The changelog urr if found
def changelog_url
return if detection_opts[:mode] == :passive
if @changelog_url.nil?
CHANGELOGS.each do |path|
return @changelog_url = url(path) if Browser.get(url(path)).code == 200
end
end
@changelog_url
end end
# @param [ String ] path # @param [ String ] path
@@ -154,5 +145,26 @@ module WPScan
super(path, params) super(path, params)
end end
# See CMSScanner::Target#head_and_get
#
# This is used by the error_log? above in the super()
# to have the correct path (ie readme.txt checked from the plugin/theme location
# and not from the blog root). Could also be used in finders
#
# @param [ String ] path
# @param [ Array<String> ] codes
# @param [ Hash ] params The requests params
# @option params [ Hash ] :head Request params for the HEAD
# @option params [ hash ] :get Request params for the GET
#
# @return [ Typhoeus::Response ]
def head_and_get(path, codes = [200], params = {})
final_path = +@path_from_blog
final_path << URI.encode(path) unless path.nil?
blog.head_and_get(final_path, codes, params)
end
end
end end
end end

View File

@@ -1,10 +1,13 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# WP Version # WP Version
class WpVersion < CMSScanner::Version class WpVersion < CMSScanner::Model::Version
include Vulnerable include Vulnerable
def initialize(number, opts = {}) def initialize(number, opts = {})
raise InvalidWordPressVersion unless WpVersion.valid?(number.to_s) raise Error::InvalidWordPressVersion unless WpVersion.valid?(number.to_s)
super(number, opts) super(number, opts)
end end
@@ -23,19 +26,18 @@ module WPScan
@all_numbers = [] @all_numbers = []
DB::Fingerprints.wp_fingerprints.each_value do |fp| DB::Fingerprints.wp_fingerprints.each_value do |fp|
fp.each_value do |versions| @all_numbers << fp.values
versions.each do |version|
@all_numbers << version unless @all_numbers.include?(version)
end
end
end end
# @all_numbers.flatten.uniq.sort! {} doesn't produce the same result here.
@all_numbers.flatten!
@all_numbers.uniq!
@all_numbers.sort! { |a, b| Gem::Version.new(b) <=> Gem::Version.new(a) } @all_numbers.sort! { |a, b| Gem::Version.new(b) <=> Gem::Version.new(a) }
end end
# @return [ JSON ] # @return [ JSON ]
def db_data def db_data
DB::Version.db_data(number) @db_data ||= DB::Version.db_data(number)
end end
# @return [ Array<Vulnerability> ] # @return [ Array<Vulnerability> ]
@@ -61,4 +63,5 @@ module WPScan
@status ||= db_data['status'] || 'Unknown' @status ||= db_data['status'] || 'Unknown'
end end
end end
end
end end

View File

@@ -1,6 +1,9 @@
# frozen_string_literal: true
module WPScan module WPScan
module Model
# Override of the CMSScanner::XMLRPC to include the references # Override of the CMSScanner::XMLRPC to include the references
class XMLRPC < CMSScanner::XMLRPC class XMLRPC < CMSScanner::Model::XMLRPC
include References # To be able to use the :wpvulndb reference if needed include References # To be able to use the :wpvulndb reference if needed
# @return [ Hash ] # @return [ Hash ]
@@ -16,4 +19,5 @@ module WPScan
} }
end end
end end
end
end end

Some files were not shown because too many files have changed in this diff Show More