brendan.mcdevitt.tech/_security/2022-02-24-docker-wordpress-vulnscanner.markdown
Brendan McDevitt e6c312a1ec big update
2022-02-25 01:56:24 -05:00

58 lines
2.3 KiB
Markdown

---
layout: security
title: "A Docker container to find Wordpress vulnerabilities"
date: 2022-02-24
categories: security
---
# WPScan Wordpress Vulnerability Database
## The data:
The WPScan team is a CNA. A [CVE Numbering
Authority](https://www.cve.org/ProgramOrganization/CNAs). A CNA basically gives the
authority to submit vulnerabilities in a piece of software (or hardware) to a particular vendor. The WPScan team finds many vulnerabilities in wordpress installs
all across the internet. Any researcher can submit a vulnerability at the
following [url](https://wpscan.com/submit).
For easier insight into the vulnerability data that they house, they have an [API](https://wpscan.com/docs/api/v3/) that can be
queried. I wrote a docker container that has shellscript wrapper that will query for
vulnerable plugins, themes, and wordpress core versions. I hope it can be
useful for somebody else that wants quick insight into the data this database
houses.
You will need to create an API token on the [wpscan](https://wpscan.com) website. They will allow you
25 free API calls per day on the free plan. That is more than enough for my
hobbyist usage with this program. You can find the source code at my gitlab
[here](https://git.mcdevitt.tech/bpmcdevitt/docker_wordpress_scanner).
Here is an example of the usage and querying for the navz-photo-gallery plugin:
```
docker run --env-file .env wp_checker --plugin 'navz-photo-gallery'
{
"navz-photo-gallery": {
"friendly_name": "ACF Photo Gallery Field",
"latest_version": "1.7.8",
"last_updated": "2021-12-22T19:24:00.000Z",
"popular": true,
"vulnerabilities": [
{
"id": "5855f1fe-28f6-4cd6-a83c-95c23d809b79",
"title": "ACF Photo Gallery Field < 1.7.5 - Reflected Cross-Site Scripting",
"created_at": "2021-12-20T09:35:11.000Z",
"updated_at": "2021-12-20T09:35:12.000Z",
"published_date": "2021-12-20T00:00:00.000Z",
"description": null,
"poc": null,
"vuln_type": "XSS",
"references": {
"cve": [
"2021-24909"
]
},
"cvss": null,
"fixed_in": "1.7.5",
"introduced_in": null
}
]
}
}
```