Loading HuntDB...

xmlrpc.php FILE IS enable on Main website

None
I
Ian Dunn
Submitted None
Reported by tibin_sunny

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
The domain contains XMLRPC activated which can cause serious damage to your server and website.Admin panel can be easily bypassed and also can cause heavy DDOS that can take down the entire server.Just a simple fix can resolve the issue.Secure your site :) URL:https://iandunn.name/wordpress/xmlrpc.php Steps to Reproduce the issue is shown on the POC video attached with this report This is what you originally see when you try to open the xmlrpc.php located at 1)http://<targetWebSite.com>/xmlrpc.php here ( https://iandunn.name/wordpress/xmlrpc.php ) 2)Open your proxy (I am using burp )and resend the request 3)The first thing to do now is Send a POST request and list all the available methods , why ? cause that’s how we’ll know which actions are even possible to make and potentially use one of them for an attack. TO list all methods Send a POST request with the following POST data,like shown in the picture,you’ll get a response with all the methods avaliable <methodCall> <methodName>system.listMethods</methodName> <params></params> </methodCall> For more details and to understand the impact watch the video attached with this mail As you asked me to submit the report on curl i just installed curl on my windows :-) Just to help you Cheers Save the below code as asd.json <methodCall> <methodName>system.listMethods</methodName> <params></params> </methodCall> curl.exe --data @asd.json -X POST https://iandunn.name/wordpress/xmlrpc.php Fix/Migration In order to fix the isuue follow the link: http://www.wpbeginner.com/plugins/how-to-disable-xml-rpc-in-wordpress/ https://digwp.com/2009/06/xmlrpc-php-security/ Similar Report: https://hackerone.com/reports/325040 Check the above report to know the actual impact of the xmlrpc.php More Details about exploitation: https://medium.com/@the.bilal.rizwan/wordpress-xmlrpc-php-common-vulnerabilites-how-to-exploit-them-d8d3c8600b32 Thank You, Hope You wil soon fix it :) ## Impact Running a system which potentially carries a lot of vulnerable endpoints and bad default settings is always a risk. Hardening should always be compulsory.

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted

Weakness

Violation of Secure Design Principles