[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Wordpress Remote Exploit - W3 Total Cache
- To: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Wordpress Remote Exploit - W3 Total Cache
- From: Grandma Eubanks <tborland1@xxxxxxxxx>
- Date: Mon, 24 Dec 2012 10:42:50 -0600
This reminds me of a funny story about a decently popular database plugin
for WordPress. Even though they use a bruteforceable value based on time of
creation, there was something even funnier. A person would make a quick
database backup and it would just place it in the backups folder, that by
default wasn't a protected directory (nor was there an option to do it via
the plugin), and you could just view && download all the backups freely.
Again, hashes and associated salt(s) were available from here.
I'll leave it for someone else to ruin what plugin it is. I use it
currently in a capture the flag game as bonus points.
On Mon, Dec 24, 2012 at 6:12 AM, Jason A. Donenfeld <Jason@xxxxxxxxx> wrote:
> On Mon, Dec 24, 2012 at 7:39 AM, Jason A. Donenfeld <Jason@xxxxxxxxx>
> wrote:
> > hashes. A simple google search of
> > "inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic
>
> An astute reader writes to me privately that the /plugins/ part of
> that googledork isn't correct, and that the best way to search is
> actually:
>
> inurl:wp-content/w3tc
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/