Wordpress users disclosure from json and xml file

Disclosed: 2022-09-02 09:25:29 By drak3hft7 To mtn_group
Low
Vulnerability Details
## Summary: It's possible to get information about the users registered (such as: username) without authentication in Wordpress via API on: https://www.mtn.co.sz/wp-json/oembed/1.0/embed?url=https://www.mtn.co.sz/&format=json https://www.mtn.co.sz/author-sitemap.xml ## Steps To Reproduce: The path https://www.mtn.co.sz/wp-json/wp/v2/users/me is configured correctly. Active usernames cannot be displayed and the application responds with code 401, saying that I am not authorized. {F1523939} But there is this active path, which allows anyone to view active usernames: https://www.mtn.co.sz/wp-json/oembed/1.0/embed?url=https://www.mtn.co.sz/&format=json https://www.mtn.co.sz/author-sitemap.xml {F1523940} {F1523941} Username found: - waseem - nkosivile These users can be used to bruteforce, thanks also to the enabled xmlrpc.php file. Perform this request with Burp: ``` POST /xmlrpc.php HTTP/1.1 Host: www.mtn.co.sz User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Upgrade-Insecure-Requests: 1 Te: trailers Content-Length: 180 <methodCall> <methodName>wp.getUsersBlogs</methodName> <params> <param><value>\{\{admin\}\}</value></param> <param><value>\{\{password\}\}</value></param></params></methodCall> ``` You can replace the "admin" parameter with the username. {F1523945} ## Impact It's possible to get all the users registered on the system and create a bruteforce directed to these users. **Suggested Mitigation/Remediation Actions** As already done for the "/wp-json/wp/v2/users/" path, I recommend blocking the active path as well. If the XMLRPC.php file is not used, it should be disabled and removed completely to avoid potential risks by bruteforce. Otherwise, it should at least be blocked from outside access.
Actions
View on HackerOne
Report Stats
  • Report ID: 1408589
  • State: Closed
  • Substate: resolved
  • Upvotes: 6
Share this report