WPSploit – Exploiting Wordpress With Metasploit. Lite SQLi Scanner. – WordPress Mashshare Plugin Info. Pack XSS Scanner. Module WebApp Msf::Exploit:.
Exploit Scanner Plugin
Aggrenox Sqli Exploit Scanner Plugins
- # www.insecurity.in
- import sys
- import urllib2
- plugins = ['kingchat.php','profilewfc.php','awaylist.php','hmflags.php','profileskype.php','socialsites.php','dymy_ua.php','profilefacebook.php','AJAXChat.php','youtube.php','tipsoftheday.php','profileblogs.php','bank.php','SuscribeUsers.php','profile_albums.php','mystatus.php','userbarplugin.php','afsignatures.php','mytabs.php', 'hello.php', 'profilexli.php', 'mytube.php', 'changfcb.php']
- kingchatinfo = '[+] MyBB Kingchat Plugin Pers. XSS and SQLi: http://www.exploit-db.com/exploits/23249/ & http://www.exploit-db.com/exploits/23105/n'
- profilewfcinfo = '[+] MyBB Wii Friend Code Multiple Vulnerabilities: http://www.exploit-db.com/exploits/23888/n'
- awaylistinfo = '[+] MyBB AwayList SQLi: http://www.exploit-db.com/exploits/23625/n'
- hmflagsinfo = '[+] MyBB HM Country Flags SQLi: http://www.exploit-db.com/exploits/23624/n'
- profileskypeinfo = '[+] MyBB User Profile Skype ID Plugin Pers. XSS: http://www.exploit-db.com/exploits/23425/n'
- socialsitesinfo = '[+] MyBB Social Sites XSS: http://www.exploit-db.com/exploits/23382/n'
- dymy_uainfo = '[+] MyBB DyMy User Agent Plugin SQLi: http://www.exploit-db.com/exploits/23359/n'
- profilefacebookinfo = '[+] MyBB Facebook Profile Pers. XSS: http://www.exploit-db.com/exploits/23355/n'
- AJAXChatinfo = '[+] MyBB AJAX Chat Multiple Vulnerabilities: http://www.exploit-db.com/exploits/23354/ & http://1337day.com/exploit/20836/n'
- youtubeinfo = '[+] MyBB MyYoutube Plugin 1.0 SQLi: http://www.exploit-db.com/exploits/23353/n'
- tipsofthedayinfo = '[+] MyBB TipsOfTheDay Plugin Multiple Vulnerabilities: http://www.exploit-db.com/exploits/23322/n'
- profileblogsinfo = '[+] MyBB Profile Blogs Plugin 1.2 Multiple Vulnerabilities: http://www.exploit-db.com/exploits/23287/n'
- bankinfo = '[+] MyBB Bank-v3 Plugin SQLi: http://www.exploit-db.com/exploits/23284/n'
- SuscribeUsersinfo = '[+] MyBB Follower User Plugin SQLi: http://www.exploit-db.com/exploits/22405/n'
- profilealbumsinfo = '[+] MyBB Profile Albums Plugin SQLi: http://www.exploit-db.com/exploits/22003/n'
- mystatusinfo = '[+] MyBB MyStatus 3.1 SQL Injection: http://www.exploit-db.com/exploits/17972/n'
- userbarplugininfo = '[+] MyBB Forum Userbar Plugin SQLi: http://www.exploit-db.com/exploits/17962/n'
- afsignaturesinfo = '[+] MyBB Advanced Forum Signatures SQLi: http://www.exploit-db.com/exploits/17961/n'
- mytabsinfo = '[+] MyBB MyTabs Plugin SQLi: http://www.exploit-db.com/exploits/17595/n'
- xblinfo = '[+] MyBB Profile Xbox Live ID SQLi: http://1337day.com/exploit/20001/n'
- mytubeinfo = '[+] MyBB MyTube Pers. XSS: http://1337day.com/exploit/19999/n'
- changuoninfo = '[+] MyBB ChangUonDyu Extra File Chatbox Pers. XSS: http://1337day.com/exploit/19957n'
- def get_path():
- source = urllib2.urlopen('http://'+host+directory+'/inc/3rdparty/diff/Diff/ThreeWay.php').read()
- source = source.replace('</b>',')
- source = source.replace('<a href=',')
- source = source.replace('[',')
- source = source.replace('Fatal error:',')
- source = source.replace('</a>',')
- source = source.replace('Failed opening required', ')
- source = source.replace('Text/Diff.php', ')
- source = source.replace('(include_path=.:) in', ')
- source = source.replace(' ', ')
- source = source.replace('inc/3rdparty/diff/Diff/ThreeWay.php', ')
- char2 = '<br />'
- if len(fullpaths) >= 1:
- print 'n[+] PHP Error for Full path: n' + source + 'n'
- print 'n[-] PHP Error for Full path: System is patched or error_reporting is set to 0 in the configuration.n'
- try:
- conn.request('HEAD', path)
- except StandardError:
- status = get_status_code(host, directory + '/inc/plugins/' + plugin)
- if status 200:
- print kingchatinfo
- elif plugin 'profilewfc.php':
- numofvulns += 1
- print awaylistinfo
- elif plugin 'hmflags.php':
- numofvulns += 1
- print profileskypeinfo
- elif plugin 'socialsites.php':
- numofvulns += 1
- print dymy_uainfo
- elif plugin 'profilefacebook.php':
- numofvulns += 1
- print AJAXChatinfo
- elif plugin 'youtube.php':
- numofvulns += 1
- print tipsofthedayinfo
- elif plugin 'profileblogs.php':
- numofvulns += 1
- print bankinfo
- elif plugin 'SuscribeUsers.php':
- numofvulns += 1
- print profilealbumsinfo
- elif plugin 'mystatus.php':
- numofvulns += 1
- print userbarplugininfo
- elif plugin 'afsignatures.php':
- numofvulns += 1
- print mytabsinfo
- elif plugin 'profilexli.php':
- numofvulns += 1
- print mytubeinfo
- elif plugin 'changfcb.php':
- numofvulns += 1
- print 'n'
- print '# Example: ./mybbscan.py www.site.com /path/'
- print '# See usage example in the box.'
- host = sys.argv[1].replace('http://',')
- numofvulns = 0
- for plugin in plugins:
- if numofvulns 0:
- else:
- print '[+++] ' + str(numofvulns) + ' vulnerable plugins were found on the host.'