CMS Explorer : Reveal CMS Components out of the Site
Do you like this story?
- Drupal and Wordpress can be explored further as well.
Options :
This explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.
Additionally, CMS Explorer can be used to aid in security testing. While it performs no direct security checks, the "explore" option can be used to reveal hidden/library files which are not typically accessed by web clients but are nonetheless accessible. This is done by retrieving the module’s current source tree and then requesting those file names from the target system. These requests can be sent through a distinct proxy to help "bootstrap" security testing tools like Burp, Paros, Webinspect, etc.
CMS Explorer can also search OSVDB for vulnerabilities with the installed components.
CMS Explorer currently supports module/theme discovery with the following products:
- Drupal
- Wordpress
- Joomla!
- Mambo
And exploration of the following products:
- Drupal
- Wordpress
Usage :
In case you specify an incorrect root level, one which actually doesnot exists at all, CMS epxlorer would not stop :P. In fact it would keep running but however with no results.
Options / Swicthes :
- bsproxy (requires value): The proxy to route any found files through. Format can be like 'http://host:port/', 'host:port' or just 'host'. If port is not specified, the default is 80.
- explore: Look for additional theme/plugin files. Only supported for Drupal and Wordpress.
- osvdb: Check osvdb.org for vulnerabilities in the installed components. Requires an API key be in a file called osvdb.key.
- plugins: Look for plugins/module/component files. By default this is enabled and both plugins and themes will be checked.
- pluginfile+ (requires value): Alternative plugin file list.
- proxy+ (requires value): Proxy for base requests. Format can be like 'http://host:port/', 'host:port' or just 'host'. If port is not specified, the default is 80.
- themes (requires value): Look for themes. By default this is enabled and both plugins and themes will be checked.
- themefile+ (requires value): Alternative theme file list.
- type+ (required, requires value): The CMS type to be tested: Drupal, Wordpress, Joomla/Mambo.
- update: Update the default lists from Wordpress and Drupal. This over-writes the current files with fresh copies.
- url+ (required, requires value): Full URL to application's root directory (where the CMS is installed)
- -verbosity+ (requires value): 1-3 in increasing levels of output.
perl cms-explorer.pl -url http://hacklpanet.in/ -v 1 -bsproxy localhost:8080 -explore -type wordpressPort 8080 can be something else as well, so on the basis of scanning and your observations regarding the ports, give it as "localhost:portnumber" . :)
By the way, lets be ready to have fun.
- Getopt::Basically a Long perl module
- LibWhisker (LW2) included, or Download from http://www.wiretrip.net/rfp/lw.asp.
- OSVDB API Key (optional): http://osvdb.org/api/about.
Subscribe to:
Post Comments (Atom)
0 Responses to “CMS Explorer : Reveal CMS Components out of the Site”
Post a Comment