Skip to main content

Wordpress finger printer tool and vulnerabilities searcher

Project description

Plecost
=======


![Logo](https://raw.githubusercontent.com/iniqua/plecost/develop/plecost_lib/doc/images/logo_plecost.jpg)


*Plecost: Wordpress vulnerabilities finder*

Code | https://github.com/iniqua/plecost/tree/python3
---- | ----------------------------------------------
Issues | https://github.com/iniqua/plecost/tree/python3/issues
Python version | Python 3.3 and above
Authors | @ggdaniel (cr0hn) - @ffranz (ffr4nz)
Last version | 1.1.1

What's Plecost?
---------------

Plecost is a vulnerability fingerprinting and vulnerability finder for Wordpress blog engine.

Why?
----

There are a huge number of Wordpress around the world. Most of them are exposed to be attacked and be converted into a virus, malware or illegal porn provider, without the knowledge of the blog owner.

This project try to help sysadmins and blog's owners to make a bit secure their Wordpress.

What's new?
-----------

### Plecost 3.1.1

- Updated CVE database & Wordpress plugin list.
- Fixed CVE & Wordpress plugins updater.
- Performance tips
- Open Issues

You can read entire list in [CHANGELOG](https://github.com/iniqua/plecost/blob/develop/CHANGELOG.md) file.

### Plecost 3.0.0

This Plecost 3.0.0 version, add a lot of new features and fixes, like:

- Fixed a lot of bugs.
- New engine: without threads or any dependencies, but run more faster. We'll used python 3 asyncio and non-blocking connections. Also consume less memory. Incredible, right? :)
- Changed CVE update system and storage: Now Plecost get vulnerabilities directly from NIST and create a local SQLite data base with filtered information for Wordpress and theirs plugins.
- Wordpress vulnerabilities: Now Plecost also manage Wordpress Vulnerabilities (not only for the Plugins).
- Add local vulnerability database are queryable. You can consult the vulnerabilities for a concrete wordpress or plugins without, using the local database.


You can read entire list in [CHANGELOG](https://github.com/iniqua/plecost/blob/develop/CHANGELOG.md) file.


Installation
------------

### Using Pypi

Install Plecost is so easy:

```bash
> python3 -m pip install plecost
```

**Remember that Plecost3 only runs in Python 3**.

### Using Docker

If you don't want to install Plecost, you can run it using Docker:

```bash
> docker run --rm iniqua/plecost {ARGS}
```

Where *{ARGS}* is any valid argument of Plecost. A real example could be:

```bash
> docker run --rm iniqua/plecost -nb -w plugin_list_10.txt http://SITE.com
```

Quick start
-----------

Scan a web site si so simple:

```bash
> plecost http://SITE.com
```

A bit complex scan: increasing verbosity exporting results in JSON format and XML:

*JSON*

```bash
> plecost -v http://SITE.com -o results.json
```

*XML*

```bash
> plecost -v http://SITE.com -o results.xml
```

Advanced scan options
---------------------

No check WordPress version, only for plugins:

```bash
> plecost -nc http://SITE.com
```

**Force scan**, even if not Wordpress was detected:

```bash
> plecost -f http://SITE.com
```

Display only the short banner:

```bash
> plecost -nb http://SITE.com
```

List available wordlists:

```bash
> plecost -nb -l

// Plecost - Wordpress finger printer Tool - v1.0.0

Available word lists:
1 - plugin_list_10.txt
2 - plugin_list_100.txt
3 - plugin_list_1000.txt
4 - plugin_list_250.txt
5 - plugin_list_50.txt
6 - plugin_list_huge.txt
```

Select a wordlist in the list:

```bash
> plecost -nb -w plugin_list_10.txt http://SITE.com
```

Increasing concurrency (**USE THIS OPTION WITH CAUTION. CAN SHUTDOWN TESTED SITE!**)

```bash
> plecost --concurrency 10 http://SITE.com
```

Or...

```bash
> plecost -c 10 http://SITE.com
```

*For more options, consult the --help command*:


```bash
> plecost -h
```

Updating
--------

New versions and vulnerabilities are released diary, you can upload the local database writing:

Updating vulnerability database:

```bash
> plecost --update-cve
```

Updating plugin list:

```bash
> plecost --update-plugins
```

Reading local vulnerability database
------------------------------------

Plecost has a local vulnerability database of Wordpress and wordpress plugins. You can consult it in off-line mode.

Listing all known plugins with vulnerabilities:

```bash
> plecost -nb --show-plugins

// Plecost - Wordpress finger printer Tool - v1.0.0

[*] Plugins with vulnerabilities known:

{ 0 } - acobot_live_chat_%26_contact_form
{ 1 } - activehelper_livehelp_live_chat
{ 2 } - ad-manager
{ 3 } - alipay
{ 4 } - all-video-gallery
{ 5 } - all_in_one_wordpress_security_and_firewall
{ 6 } - another_wordpress_classifieds_plugin
{ 7 } - anyfont
{ 8 } - april%27s_super_functions_pack
{ 9 } - banner_effect_header
{ 10 } - bannerman
{ 11 } - bib2html
{ 12 } - bic_media_widget
{ 13 } - bird_feeder
{ 14 } - blogstand-smart-banner
{ 15 } - blue_wrench_video_widget
...

[*] Done!
```

Show vulnerabilities of a concrete plugin:

```bash
> plecost -nb -vp google_analytics

// Plecost - Wordpress finger printer Tool - v1.0.0

[*] Associated CVEs for plugin 'google_analytics':

{ 0 } - CVE-2014-9174:

Affected versions:

<0> - 5.1.2
<1> - 5.1.1
<2> - 5.1
<3> - 5.1.0

[*] Done!
```

Show details of a concrete CVE:

```bash
> plecost -nb --cve CVE-2014-9174

// Plecost - Wordpress finger printer Tool - v1.0.0

[*] Detail for CVE 'CVE-2014-9174':

Cross-site scripting (XSS) vulnerability in the Google Analytics by Yoast (google-analytics-for-wordpress) plugin before 5.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "Manually enter your UA code" (manual_ua_code_field) field in the General Settings.


[*] Done!

```

Examples
--------

Getting the [100k top WordPress sites (http://hackertarget.com/100k-top-wordpress-powered-sites/) and getting aleatory one of them...

![running](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/running.gif)

And... here more results of Plecost for real sites... :)

![Example1](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example1.png)
![Example2](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example2.png)
![Example3](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example3.png)
![Example4](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example4.png)
![Example5](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example5.png)
![Example6](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example6.png)
![Example7](https://raw.githubusercontent.com/iniqua/plecost/python3/plecost_lib/doc/images/scan_example7.png)

Where to fish?
--------------

Plecost is available on:

* Kali Linux http://www.kali.org/
* BackTrack 5 http://www.backtrack-linux.org/
* BackBox http://www.backbox.org/

References
----------

* http://www.securitybydefault.com/2010/03/seguridad-en-wordpress.html
* http://www.securitybydefault.com/2011/11/identificacion-de-vulnerabilidades-en.html
* http://www.clshack.it/plecost-a-wordpress-penetration-test-for-plugins
* http://securityetalii.wordpress.com/2010/03/06/auditando-wordpress-con-plecost/
* http://loginroot.diosdelared.com/?coment=6116
* http://ayudawordpress.com/securidad-en-wordpress/
* http://www.ehacking.net/2012/05/wordpress-security-vulnerability.html

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

plecost-1.1.3.tar.gz (638.6 kB view details)

Uploaded Source

File details

Details for the file plecost-1.1.3.tar.gz.

File metadata

  • Download URL: plecost-1.1.3.tar.gz
  • Upload date:
  • Size: 638.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for plecost-1.1.3.tar.gz
Algorithm Hash digest
SHA256 41b9f8c3f221ca6a450860b0f8621ccd1ca49a4a54fa602f8477ce04bbba3d57
MD5 5a9c7dd9a32c311b2813265b45e868c2
BLAKE2b-256 f26d37c31924185794f41b522b94ecc11b09f3c27eb4f9d8cd4a0791cfcfeff1

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page