Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Sifchain: xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Sifchain: xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
Hi Team :) i am abbas heybati ;) Summary: After reviewing the given scope, I realized that the main domain "http://sifchain.finance" has several vulnerabilities that I will report to you as a scenario. I realize that I have reported to you outside of Scope. The report is related to the mentioned company and the vulnerability can endanger your business. I consider it my duty to report this vulnerability to you. the XML-RPC interface opens two kinds of attacks: https://sifchain.finance/xmlrpc.php XML-RPC pingbacks Brute force attacks via XML-RPC And in the /wp-json/wp/v2/users path, it reveals all the user information https://sifchain.finance/wp-json/wp/v2/users Steps To Reproduce: For the two vulnerabilities listed above in the xmlrpc.php section, first post a request to xmlrpc.php for <methodName> system.listMethods </methodName> given Post Request: ``` POST /xmlrpc.php HTTP/1.1 Host: sifchain.finance User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Cookie: __cfduid=dcb7a4e2b0f6a7042e39b0bd33aa4128a1617428272 Upgrade-Insecure-Requests: 1 Content-Length: 135 system.listMethods ``` Response: ``` HTTP/1.1 200 OK Date: Sat, 03 Apr 2021 05:49:32 GMT Content-Type: text/xml; charset=UTF-8 Connection: close Strict-Transport-Security: max-age=15552000; includeSubDomains Vary:... ...



๐Ÿ“Œ NordVPN: xmlrpc.php FILE IS enable it will used for Bruteforce attack and Denial of Service(DoS)


๐Ÿ“ˆ 74.54 Punkte

๐Ÿ“Œ Ian Dunn: xmlrpc.php FILE IS enable it can be used for conducting a Bruteforce attack and Denial of Service(DoS)


๐Ÿ“ˆ 74.54 Punkte

๐Ÿ“Œ Top Echelon Software: xmlrpc.php FILE IS enable it will used for Bruteforce attack and Denial of Service(DoS)


๐Ÿ“ˆ 74.54 Punkte

๐Ÿ“Œ Maker Ecosystem Growth Holdings, Inc: xmlrpc.php FILE IS enable it will used for Bruteforce attack


๐Ÿ“ˆ 67.47 Punkte

๐Ÿ“Œ Maker Ecosystem Growth Holdings, Inc: xmlrpc.php FILE IS enabled it will used for Bruteforce attack and Denial of Service(DoS)


๐Ÿ“ˆ 64.82 Punkte

๐Ÿ“Œ Sifchain: xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service


๐Ÿ“ˆ 53.07 Punkte

๐Ÿ“Œ Sifchain: Possibility of DoS attack at https://sifchain.finance// via CVE-2018-6389 exploitation


๐Ÿ“ˆ 51.08 Punkte

๐Ÿ“Œ Sifchain: Information disclosure on Sifchain


๐Ÿ“ˆ 45.72 Punkte

๐Ÿ“Œ Sifchain: Clickjacking Vulnerability in sifchain.finance


๐Ÿ“ˆ 45.72 Punkte

๐Ÿ“Œ Sifchain: Email Spoofing on sifchain.finance


๐Ÿ“ˆ 45.72 Punkte

๐Ÿ“Œ Sifchain: Information Disclosure on https://rpc.sifchain.finance/


๐Ÿ“ˆ 45.72 Punkte

๐Ÿ“Œ WordPress up to 4.3.0 XMLRPC Subsystem class-wp-xmlrpc-server.php mw_editPost privilege escalation


๐Ÿ“ˆ 41.58 Punkte

๐Ÿ“Œ WordPress up to 4.3.0 XMLRPC Subsystem class-wp-xmlrpc-server.php mw_editPost privilege escalation


๐Ÿ“ˆ 41.58 Punkte

๐Ÿ“Œ WordPress 2.2 XMLRPC XMLRPC.PHP sql injection


๐Ÿ“ˆ 41.58 Punkte

๐Ÿ“Œ WordPress bis 4.3.0 XMLRPC Subsystem class-wp-xmlrpc-server.php mw_editPost erweiterte Rechte


๐Ÿ“ˆ 41.58 Punkte

๐Ÿ“Œ WordPress bis 4.3.0 XMLRPC Subsystem class-wp-xmlrpc-server.php mw_editPost erweiterte Rechte


๐Ÿ“ˆ 41.58 Punkte

๐Ÿ“Œ XMLRPC Bruteforcer - An XMLRPC Brute Forcer Targeting Wordpress


๐Ÿ“ˆ 38.07 Punkte

๐Ÿ“Œ EvilNet - Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack Revealed Etc...


๐Ÿ“ˆ 32.16 Punkte

๐Ÿ“Œ [webapps] WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service


๐Ÿ“ˆ 28.55 Punkte

๐Ÿ“Œ WordPress Core < 5.3.x xmlrpc.php Denial of Service


๐Ÿ“ˆ 28.55 Punkte

๐Ÿ“Œ #0daytoday #WordPress Core &amp;lt; 5.3.x - (xmlrpc.php) Denial of Service Exploit [#0day #Exploit]


๐Ÿ“ˆ 28.55 Punkte

๐Ÿ“Œ Sifchain: Vulnerable for clickjacking attack


๐Ÿ“ˆ 28.22 Punkte

๐Ÿ“Œ Sifchain: A password in plain text in conf file


๐Ÿ“ˆ 26.99 Punkte

๐Ÿ“Œ TTS Bug Bounty: xmlrpc.php file enabled - data.gov


๐Ÿ“ˆ 26.68 Punkte

๐Ÿ“Œ U.S. Dept Of Defense: Unauthenticated Blind SSRF at https://โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ via xmlrpc.php file


๐Ÿ“ˆ 26.68 Punkte

๐Ÿ“Œ Sifchain: Found key_adress and key_password in GitHub history


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Sifchain: Found a url on source code which was disclosing different juicy informations like ip addresses and available endponts


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Bruteforce WPA2 Faster With Keyspace Attack


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ Bruteforce WPA2 Faster With Keyspace Attack


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ BruteDum- A network attack bruteforce tool


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ SocialBox - A Bruteforce Attack Framework (Facebook, Gmail, Instagram, Twitter)


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ SocialBox - A Bruteforce Attack Framework for Social Networks


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ BrutePrint โ€“ Bruteforce Attack to Bypass User Authentication on Smartphones


๐Ÿ“ˆ 23.48 Punkte

๐Ÿ“Œ Yelp: xmlrpc file enabled


๐Ÿ“ˆ 23.16 Punkte

๐Ÿ“Œ Sifchain: RSA PRIVATE KEY discloser


๐Ÿ“ˆ 22.86 Punkte











matomo