While having a look at nikito yesterday I stumbled accross cms-explorer. It’s an interesting little program that checks the themes/modules/plugins installed in common CMS systems (Drupal, WordPress, Joomla! and Mambo), with automatic exploration for Drupal and WordPress. It also has some nice bonus features like providing a list of known issues for plugins found by accessing the OSVDB.org database.
Example output:
1
2
3
4
5
6
7
8
|
Plugin Installed: wp-content/plugins/hello.php
URL http://www.dopefish.de/wp-content/plugins/hello.php
SVN http://svn.wp-plugins.org/wp-content/plugins/hello.phptrunk/
http://osvdb.org/22654 WordPress wp-content/plugins/hello.php Direct Request Path Disclosure
http://osvdb.org/62684 WordPress wp-content/plugins/hello.php add_action() Function Path Disclosure
Plugin Installed: wp-content/plugins/devformatter/
URL http://www.dopefish.de/wp-content/plugins/devformatter/
SVN http://svn.wp-plugins.org/wp-content/plugins/devformatter/trunk/
|
Running it against my own webspace revealed a possible SQL injection I was unaware of. *) Fixed that, will probably replace that plugin completely this week, anything that has stuff so obviously bad in it is generally not all too sane.
*) I normally look at plugins before I install them, must have missed this one. @ PHP programmers: anyone who passes on the content of a $_REQUEST directly to a SQL query without any sanity checking deserves to be flogged with his own code.