sgdynamo_path.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 91 行
NASL
91 行
## This script written by Scott Shebby (12/2003) ## See the Nessus Scripts License for details## Ref:# From: "Ruso, Anthony" <aruso@positron.qc.ca># To: Penetration Testers <PEN-TEST@SECURITYFOCUS.COM># Subject: Sgdynamo.exe Script -- Path Disclosure# Date: Wed, 16 May 2001 11:55:32 -0400### Changes by rd :# - Description# - Support for multiple CGI directories# - HTTP KeepAlive support# - egrep() instead of eregmatch()#if(description){ script_id(11954); script_version ("$Revision: 38 $"); name["english"] = "sgdynamo_path"; script_name(english:name["english"]); desc["english"] = "The CGI 'sgdynamo.exe' can be tricked into giving the physical path to the remote web root.This information may be useful to an attacker who can use it to make betterattacks against the remote server.Solution : None at this timeRisk factor : Low"; script_description(english:desc["english"]); summary["english"] = "sgdynamo.exe Path Disclosure"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2003 Scott Shebby"); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes", "http_version.nasl"); script_require_ports("Services/www", 80); script_exclude_keys("Settings/disable_cgi_scanning"); exit(0);}## The script code starts here#include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);foreach dir (cgi_dirs()){ url = dir + "/sgdynamo.exe?HTNAME=sgdynamo.exe"; req = http_get(item:url, port:port); resp = http_keepalive_send_recv(port:port, data:req); if ( resp == NULL ) exit(0); path = egrep(pattern:"[aA-zZ]:\\.*sgdynamo\.exe", string:resp); if (path) { path = ereg_replace(string:path, pattern:".*([aA-zZ]:\\.*sgdynamo\.exe).*", replace:"\1"); report = "It is possible to obtain the phyiscal path to the remote website by sendingthe following request :" + egrep(pattern:"^GET /", string:req) + "We determined that the remote web path is : '" + path + "'This information may be useful to an attacker who can use it to make betterattacks against the remote server.Solution : None at this timeRisk factor : Low"; security_note(port:port, data:report); exit(0); }}
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?