⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sgdynamo_path.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script written by Scott Shebby (12/2003) ## See the Nessus Scripts License for details## Ref:# From: "Ruso, Anthony" <aruso@positron.qc.ca># To: Penetration Testers <PEN-TEST@SECURITYFOCUS.COM># Subject: Sgdynamo.exe Script -- Path Disclosure# Date: Wed, 16 May 2001 11:55:32 -0400### Changes by rd :#	- Description#	- Support for multiple CGI directories#	- HTTP KeepAlive support#	- egrep() instead of eregmatch()#if(description){ script_id(11954); script_version ("$Revision: 38 $"); name["english"] = "sgdynamo_path"; script_name(english:name["english"]); desc["english"] = "The CGI 'sgdynamo.exe' can be tricked into giving the physical path to the remote web root.This information may be useful to an attacker who can use it to make betterattacks against the remote server.Solution : None at this timeRisk factor : Low"; script_description(english:desc["english"]);  summary["english"] = "sgdynamo.exe Path Disclosure"; script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2003 Scott Shebby"); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes", "http_version.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0);}## The script code starts here#include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);foreach dir (cgi_dirs()){ url = dir + "/sgdynamo.exe?HTNAME=sgdynamo.exe"; req = http_get(item:url, port:port); resp = http_keepalive_send_recv(port:port, data:req); if ( resp == NULL ) exit(0); path = egrep(pattern:"[aA-zZ]:\\.*sgdynamo\.exe", string:resp); if (path) {   path = ereg_replace(string:path, pattern:".*([aA-zZ]:\\.*sgdynamo\.exe).*", replace:"\1");   report = "It is possible to obtain the phyiscal path to the remote website by sendingthe following request :" + egrep(pattern:"^GET /", string:req) + "We determined that the remote web path is : '" + path + "'This information may be useful to an attacker who can use it to make betterattacks against the remote server.Solution : None at this timeRisk factor : Low";   security_note(port:port, data:report);   exit(0);  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -