⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sambar_xss.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# kst-gpl## This script was written by Renaud Deraison## GPL## References:# Date: 27 Mar 2003 17:26:19 -0000# From: "Gr間ory" Le Bras <gregory.lebras@security-corporation.com># To: bugtraq@securityfocus.com# Subject: [SCSA-012] Multiple vulnerabilities in Sambar Server#if(description){ script_version ("$Revision: 1.10 $"); script_id(80083);; script_bugtraq_id(7209); if (NASL_LEVEL >= 2200) {  script_xref(name:"OSVDB", value:"5097");  script_xref(name:"OSVDB", value:"5100");  script_xref(name:"OSVDB", value:"5101");  script_xref(name:"OSVDB", value:"5102");  script_xref(name:"OSVDB", value:"5103");  script_xref(name:"OSVDB", value:"5104");  script_xref(name:"OSVDB", value:"5105");  script_xref(name:"OSVDB", value:"5106");  script_xref(name:"OSVDB", value:"5107");  script_xref(name:"OSVDB", value:"5108");  script_xref(name:"OSVDB", value:"5803");  script_xref(name:"OSVDB", value:"5804");  script_xref(name:"OSVDB", value:"5805");  script_xref(name:"OSVDB", value:"5806");  script_xref(name:"OSVDB", value:"5807");  script_xref(name:"OSVDB", value:"5808");  script_xref(name:"OSVDB", value:"5809");  script_xref(name:"OSVDB", value:"5810");  script_xref(name:"OSVDB", value:"5811");  script_xref(name:"OSVDB", value:"5812");  script_xref(name:"OSVDB", value:"5813");  script_xref(name:"OSVDB", value:"5814");  script_xref(name:"OSVDB", value:"5815");  script_xref(name:"OSVDB", value:"5816");  script_xref(name:"OSVDB", value:"5817");  script_xref(name:"OSVDB", value:"5818");  script_xref(name:"OSVDB", value:"5819");  script_xref(name:"OSVDB", value:"5820"); } script_name(english:"Sambar XSS");   desc["english"] = "The Sambar web server comes with a set of CGIs are that vulnerableto a cross site scripting attack.An attacker may use this flaw to steal the cookies of your web users.Solution : Delete these CGIsRisk factor : Medium"; script_description(english:desc["english"]);  summary["english"] = "Tests for XSS attacks"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright("This script is Copyright (C) 2003 Renaud Deraison"); family["english"] = "CGI abuses : XSS"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencies("find_service1.nasl", "http_version.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 80); script_require_keys("www/sambar"); exit(0);}# The script code starts hereinclude("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0);cgis = make_list("/netutils/ipdata.stm?ipaddr=",		 "/netutils/whodata.stm?sitename=",		 "/netutils/finddata.stm?user=",		 "/isapi/testisa.dll?check1=",		 "/cgi-bin/environ.pl?param1=",		 "/samples/search.dll?login=AND&query=",		 "/wwwping/index.stm?wwwsite=",		 "/syshelp/stmex.stm?bar=456&foo=",		 "/syshelp/cscript/showfunc.stm?func=",		 "/syshelp/cscript/showfnc.stm?pkg=",		 "/sysuser/docmgr/ieedit.stm?path=",		 "/sysuser/docmgr/edit.stm?path=",		 "/sysuser/docmgr/iecreate.stm?path=",		 "/sysuser/docmgr/create.stm?path=",		 "/sysuser/docmgr/info.stm?path=",		 "/sysuser/docmgr/ftp.stm?path=",		 "/sysuser/docmgr/htaccess.stm?path=",		 "/sysuser/docmgr/mkdir.stm?path=",		 "/sysuser/docmgr/rename.stm?path=",		 "/sysuser/docmgr/search.stm?path=",		 "/sysuser/docmgr/sendmail.stm?path=",		 "/sysuser/docmgr/template.stm?path=",		 "/sysuser/docmgr/update.stm?path=",		 "/sysuser/docmgr/vccheckin.stm?path=",		 "/sysuser/docmgr/vccreate.stm?path=",		 "/sysuser/docmgr/vchist.stm?path=",		 "/cgi-bin/testcgi.exe?");		 report = NULL;foreach c (cgis){ req = http_get(item:c+"<script>foo</script>", port:port); res = http_keepalive_send_recv(port:port, data:req, bodyonly:1); if( res == NULL ) exit(0); if("<script>foo</script>" >< res) {  report += c + '<script>code</script>\n'; }}if ( report != NULL ){ text = "The following Sambar default CGIs are vulnerable to a cross-site scriptingattack. An attacker may use this flaw to steal the cookies of yourusers :" + report + "Solution : Delete these CGIs.Risk factor : Medium"; security_warning(port:port, data:text); set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -