📄 resin_path_disclosure.nasl
字号:
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added BugtraqID## GPL## Source:# From:"Peter_Gr黱dl" <pgrundl@kpmg.dk># To:"bugtraq" <bugtraq@securityfocus.com># Subject: KPMG-2002033: Resin DOS device path disclosure# Date: Wed, 17 Jul 2002 11:33:59 +0200desc = "Resin will reveal the physical path of the webroot when asked for a special DOS device, e.g. lpt9.xtpAn attacker may use this flaw to gain further knowledgeabout the remote filesystem layout.Solution : Upgrade to a later software version.Risk factor : Low";if(description){ script_id(11048); script_cve_id("CVE-2002-2090"); script_bugtraq_id(5252); script_version ("$Revision: 118 $"); name["english"] = "Resin DOS device path disclosure"; script_name(english:name["english"]); script_description(english:desc); summary["english"] = "Tests for Resin path disclosure vulnerability"; script_summary(english:summary["english"]); script_category(ACT_MIXED_ATTACK); script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("find_service.nes", "no404.nasl"); script_require_ports("Services/www", 80); exit(0);}#include("http_func.inc");port = get_http_port(default:8282);if(!get_port_state(port)) exit(0);# Requesting a DOS device may hang some servers# According to Peter Gr黱dl's advisory:# Vulnerable:# Resin 2.1.1 on Windows 2000 Server# Resin 2.1.2 on Windows 2000 Server# <security-protocols@hushmail.com> added Resin 2.1.0# Not Vulnerable:# Resin 2.1.s020711 on Windows 2000 Server# # The banner for snapshot 020604 looks like this:# Server: Resin/2.1.s020604banner = get_http_banner(port: port);vulnver=0;if ( "Resin/" >!< banner ) exit(0);# I suppose that any 2.1 snapshot is all right.if (egrep(pattern: "^Server: *Resin/2\.((0\..*)|(1\.[0-2]))", string: banner, icase: 1) ) vulnver=1;if (safe_checks()){ if (vulnver) { msg = string( desc, "\n\n*** OpenVAS solely relied on the version number of your\n", "*** server, so this may be a false alert.\n"); security_warning(port: port, data: msg); } exit(0);}soc = open_sock_tcp(port);if(!soc) exit(0);req = http_get(item:"/aux.xtp", port:port);send(socket:soc, data:req);h = http_recv_headers2(socket:soc);r = http_recv_body(socket:soc, headers:h);close(soc);badreq=0; vuln=0;if(egrep(pattern: "^500 ", string: h)) badreq=1;if (egrep(pattern: "[CDE]:\\(.*\\)*aux.xtp", string:r)) vuln=1;if (vuln) { path = egrep(pattern: "[CDE]:\\(.*\\)*aux.xtp", string:r); path = ereg_replace(pattern:".*([CDE]:\\.*aux\.xtp).*", string:path, replace:"\1");desc = "The remote web server reveals the physical path of the webroot when asked for a special DOS device, e.g. lpt9.xtpFor instance, requesting :GET /aux.xtpReturns the following path(s) : " + path + "An attacker may use this flaw to gain further knowledgeabout the remote filesystem layout.Solution : Upgrade to a later software version.Risk factor : Low"; security_note(port:port, data:desc); exit(0);}if (vulnver) { msg = string( desc, "\n*** The version number of your server looks vulnerable\n", "*** but the attack did not succeed, so this may be a false alert.\n"); security_warning(port: port, data: msg); }
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -