📄 apache_tomcat_dos_device_xss.nasl
字号:
## This script was written by Matt Moore <matt.moore@westpoint.ltd.uk>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added BugtraqID# Also covers BugtraqID: 5193 (same Advisory ID#: wp-02-0008)## See the Nessus Scripts License for details#if(description){ script_id(11042); script_bugtraq_id(5194); script_version("$Revision: 38 $"); name["english"] = "Apache Tomcat DOS Device Name XSS"; name["francais"] = "Apache Tomcat DOS Device Name XSS"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = "Synopsis :The remote Apache Tomcat web server is vulnerable to a cross site scripting issue.Description :Apache Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies.By making requests for DOS Device names it is possible to causeTomcat to throw an exception, allowing XSS attacks, e.g:tomcat-server/COM2.IMG%20src='Javascript:alert(document.domain)'(angle brackets omitted)The exception also reveals the physical path of the Tomcat installation.Solution : Upgrade to Apache Tomcat v4.1.3 beta or later.See also : http://www.westpoint.ltd.uk/advisories/wp-02-0008.txtRisk factor : Low / CVSS Base Score : 3(AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)"; script_description(english:desc["english"]); summary["english"] = "Tests for Apache Tomcat DOS Device name XSS Bug"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2002 Matt Moore", francais:"Ce script est Copyright (C) 2002 Matt Moore"); family["english"] = "CGI abuses : XSS"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("http_version.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 8080); script_require_keys("www/apache"); exit(0);}# Check starts hereinclude("http_func.inc");port = get_http_port(default:8080);if(!port || !get_port_state(port)) exit(0);if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);banner = get_http_banner(port:port);if (!egrep(pattern:"^Server: .*Tomcat/([0-3]\.|4\.0|4\.1\.[0-2][^0-9])", string:banner) ) exit(0);req = http_get(item:"/COM2.<IMG%20SRC='JavaScript:alert(document.domain)'>", port:port);soc = http_open_socket(port);if(soc){ send(socket:soc, data:req); r = http_recv(socket:soc); http_close_socket(soc); confirmed = string("JavaScript:alert(document.domain)"); confirmed_too = string("java.io.FileNotFoundException"); if ((confirmed >< r) && (confirmed_too >< r)) { security_note(port); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -