Closed
Bug 890444
Opened 11 years ago
Closed 11 years ago
XML-RPC Pingback Vulnerability in b.m.o
Categories
(Websites :: other.mozilla.org, defect)
Websites
other.mozilla.org
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 869146
People
(Reporter: securityexpert, Unassigned)
Details
User Agent: Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.116 Safari/537.36 Steps to reproduce: Hi My name is Ehraz Ahmed and i've Found a Word Press XMS-RPC Pingback Vulnerability in https://blog.mozilla.org/mrbkap/ here is the POC- Here are the 2 Vulnerability POC Found in Mozilla:- https://blog.mozilla.org/mrbkap/xmlrpc.php http://hacks.mozilla.org/xmlrpc.php Please reply back fast It would be great if i get an acknowledgement and a bounty for reporting this vulnerability. Actual results: There are many exploits for XML-RPC in the web, You can use this for Remote code execution, Port Scanning, and more. You just need to send Post Requests.. Please fix this To fix this issue, Please Remove the file Immediately.... Expected results: By interfacing with the API an attacker can cause the WordPress site to port scan an external target and return results. Using a small ruby script we were able to run a port scan on external target from the affected WordPress server (Metaspoit has module for that Name “WordPress Pingback PortScanner”.)
Updated•11 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 11 years ago
Resolution: --- → DUPLICATE
Updated•11 years ago
|
Group: mozilla-services-security → websites-security
Component: General → other.mozilla.org
Product: Mozilla Services → Websites
Updated•11 years ago
|
Flags: sec-bounty-
Summary: Reporting a Critical Vulnerability in Mozilla → XMS-RPC Pingback Vulnerability in b.m.o
Updated•11 years ago
|
Group: websites-security
Updated•11 years ago
|
Summary: XMS-RPC Pingback Vulnerability in b.m.o → XML-RPC Pingback Vulnerability in b.m.o
You need to log in
before you can comment on or make changes to this bug.
Description
•