⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 resin_path_disclosure.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>#      Erik Anderson <eanders@carmichaelsecurity.com>#      Added BugtraqID## GPL## Source:# From:"Peter_Gr黱dl" <pgrundl@kpmg.dk># To:"bugtraq" <bugtraq@securityfocus.com># Subject: KPMG-2002033: Resin DOS device path disclosure# Date: Wed, 17 Jul 2002 11:33:59 +0200desc = "Resin will reveal the physical path of the webroot when asked for a special DOS device, e.g. lpt9.xtpAn attacker may use this flaw to gain further knowledgeabout the remote filesystem layout.Solution : Upgrade to a later software version.Risk factor : Low";if(description){ script_id(11048); script_cve_id("CVE-2002-2090"); script_bugtraq_id(5252); script_version ("$Revision: 118 $"); name["english"] = "Resin DOS device path disclosure"; script_name(english:name["english"]);  script_description(english:desc);  summary["english"] = "Tests for Resin path disclosure vulnerability";  script_summary(english:summary["english"]);  script_category(ACT_MIXED_ATTACK);  script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("find_service.nes", "no404.nasl"); script_require_ports("Services/www", 80); exit(0);}#include("http_func.inc");port = get_http_port(default:8282);if(!get_port_state(port)) exit(0);# Requesting a DOS device may hang some servers# According to Peter Gr黱dl's advisory:# Vulnerable:# Resin 2.1.1 on Windows 2000 Server# Resin 2.1.2 on Windows 2000 Server# <security-protocols@hushmail.com> added Resin 2.1.0# Not Vulnerable:# Resin 2.1.s020711 on Windows 2000 Server# # The banner for snapshot 020604 looks like this:# Server: Resin/2.1.s020604banner = get_http_banner(port: port);vulnver=0;if ( "Resin/" >!< banner ) exit(0);# I suppose that any 2.1 snapshot is all right.if (egrep(pattern: "^Server: *Resin/2\.((0\..*)|(1\.[0-2]))",	string: banner, icase: 1) ) vulnver=1;if (safe_checks()){ if (vulnver) {  msg = string(	desc, 	"\n\n*** OpenVAS solely relied on the version number of your\n",	"*** server, so this may be a false alert.\n");  security_warning(port: port, data: msg); } exit(0);}soc = open_sock_tcp(port);if(!soc) exit(0);req = http_get(item:"/aux.xtp", port:port);send(socket:soc, data:req);h = http_recv_headers2(socket:soc);r = http_recv_body(socket:soc, headers:h);close(soc);badreq=0; vuln=0;if(egrep(pattern: "^500 ", string: h)) badreq=1;if (egrep(pattern: "[CDE]:\\(.*\\)*aux.xtp", string:r)) vuln=1;if (vuln) { 	path = egrep(pattern: "[CDE]:\\(.*\\)*aux.xtp", string:r);	path = ereg_replace(pattern:".*([CDE]:\\.*aux\.xtp).*", string:path, replace:"\1");desc = "The remote web server reveals the physical path of the webroot when asked for a special DOS device, e.g. lpt9.xtpFor instance, requesting :GET /aux.xtpReturns the following path(s) : " + path + "An attacker may use this flaw to gain further knowledgeabout the remote filesystem layout.Solution : Upgrade to a later software version.Risk factor : Low";		security_note(port:port, data:desc); exit(0);}if (vulnver) { msg = string(	desc, 	"\n*** The version number of your server looks vulnerable\n",	"*** but the attack did not succeed, so this may be a false alert.\n"); security_warning(port: port, data: msg);   }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -