nds_web_based_browsing.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 76 行

NASL
76
字号
## Copyright 2001 by Noam Rathaus <noamr@securiteam.com> ## See the Nessus Scripts License for details##if(description){ script_id(10739);  script_bugtraq_id(484); script_cve_id("CAN-1999-1020"); script_version ("$Revision: 38 $");  name["english"] = "Novell Web Server NDS Tree Browsing"; script_name(english:name["english"]);  desc["english"] = "The Novell Web Server default ndsobj.nlm CGI (LCGI) was detected. This CGI allows browsing of the NDS Tree without any need for authentication.Gaining access to the NDS Tree reveals sensitive information to an attacker.Solution: Configure your Novell Web Server to block access to this CGI, or delete it if you do not use it.For More Information: http://www.securiteam.com/securitynews/5XP0L1555W.htmlRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "Novell Web Server NDS Tree Browsing"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  family["english"] = "CGI abuses"; script_family(english:family["english"]); script_copyright(english:"This script is Copyright (C) 2001 SecuriTeam"); script_dependencie("find_service.nes", "no404.nasl"); script_require_ports("Services/www", 80); exit(0);}## The script code starts here#include("http_func.inc");include("http_keepalive.inc");  dir[0] = "/lcgi"; dir[1] = "/lcgi-bin"; dir[2] = "/LCGI"; dir[3] = "/apage/lcgi-bin"; port = get_http_port(default:80); if (get_port_state(port)){  for(i=0;dir[i];i=i+1)  {  data = http_get(item:dir[i], port:port);  resultrecv = http_keepalive_send_recv(port:port, data:data);  if(resultrecv == NULL ) exit(0);  if ("Available NDS Trees" >< resultrecv)  {    security_hole(port:port);    exit(0);  } }}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?