⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sympa_new_list_xss.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# kst-gpl## (C) Tenable Network Security# based on work from David Maciejak## This script is released under the GNU GPLv2if(description){ script_id(80090);; script_version ("$Revision: 1.12 $");  script_cve_id("CVE-2004-1735"); script_bugtraq_id(10992); script_xref(name:"OSVDB", value:"9081"); script_xref(name:"Secunia", value:"12339"); name["english"] = "Sympa New List Cross-Site Scripting Vulnerability"; script_name(english:name["english"]); desc["english"] = "Synopsis :The remote web server contains a CGI script that is affected by across-site scripting vulnerability. Description :According to its version number, the installation of Sympa on theremote host contains an HTML injection vulnerability that may allow auser who has the privileges to create a new list to inject HTML tagsin the list description field. See also :http://archives.neohapsis.com/archives/bugtraq/2004-08/0293.htmlSolution : Update to version 4.1.3 or newer.Risk factor : Low / CVSS Base Score : 3.5(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)"; script_description(english:desc["english"]);  summary["english"] = "Checks sympa version"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2008 Tenable Network Security"); family["english"] = "CGI abuses : XSS"; script_family(english:family["english"]); script_dependencies("sympa_detect.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0);}## The script code starts here#include("global_settings.inc");include("http_func.inc");# nb: banner checks of open-source software are prone to false-#     positives so only run the check if reporting is paranoid.if (report_paranoia < 2) exit(0);port = get_http_port(default:80);if(!get_port_state(port))exit(0);# Test an install.install = get_kb_item(string("www/", port, "/sympa"));if (isnull(install)) exit(0);matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");if (!isnull(matches)){  ver = matches[1];  if (ver =~ "^(2\.|3\.|4\.0\.|4\.1\.[012]([^0-9]|$))")  {    security_note(port);    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);    exit(0);  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -