XMLRPC, Enabling XPSA and Bruteforce and DOS + A file disclosing installer-logs.
High
M
MTN Group
Submitted None
Actions:
Reported by
tandav
Vulnerability Details
Technical details and impact analysis
## Summary:
[XMLRPC+Installer_logs+Backup_Filename+Admin_username+disclosure]
## Steps To Reproduce:
1. I was able to successfully exploit XMLRPC with the traditional method, the brute-force was done the username was there in the Installer Logs
2. path to XMLRPC is http://13.92.255.102/xmlrpc.php + the username is in https://lonestarcell.com/installer-log.txt
3. Pingback ping can be used to dos the target server when mishandled
## Supporting Material/References:
I was able to reproduce this whole https://www.netsparker.com/blog/web-security/xml-rpc-protocol-ip-disclosure-attacks/
## Impact
1)Automated once from multiple hosts and be used to cause a mass DDOS attack on the victim.
2) This method is also used for brute force attacks to stealing the admin credentials and other important credentials
3) File disclosure is causing most harm as internal criticals are popping out
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Uncontrolled Resource Consumption