⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 invision_pwb.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
##  This script was written by David Maciejak <david dot maciejak at kyxar dot fr>#  based on work from#  (C) Tenable Network Security##  Ref: Alexander Antipov <Antipov SecurityLab ru>##  This script is released under the GNU GPL v2#if(description) {   script_id(15425);   script_cve_id("CVE-2004-1578");  script_bugtraq_id(11332);  script_version("$Revision: 38 $");         name["english"] = "Invision Power Board XSS";           script_name(english:name["english"]); desc["english"] = "The remote host is running Invision Power Board, a web-based bulletin-boardsystem written in PHP.This version of Invision Power Board is vulnerable to cross-site scripting attacks, which may allow an attacker to steal users cookies.        Solution: Upgrade to the latest version of this softwareRisk factor : Medium";           script_description(english:desc["english"]);           summary["english"] = "Checks for Invision Power Board XSS";  script_summary(english:summary["english"]);  script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2004 David Maciejak");  family["english"] = "CGI abuses : XSS";  script_family(english:family["english"]);	  script_dependencie("http_version.nasl", "invision_power_board_detect.nasl");  script_require_ports("Services/www", 80);  exit(0);}include("http_func.inc");port = get_http_port(default:80);if ( ! port || ! get_port_state(port) ) exit(0);# Check each installed instance, stopping if we find a vulnerability.installs = get_kb_list(string("www/", port, "/invision_power_board"));if (isnull(installs)) exit(0);foreach install (installs) {  matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");  if (!isnull(matches)) {    ver = matches[1];    dir = matches[2];    s = string( "GET ", dir, "/index.php?s=5875d919a790a7c429c955e4d65b5d54&act=Login&CODE=00 HTTP/1.1\r\n", "Host: ", get_host_name(), "\r\n", "Referer: <script>foo</script>", "\r\n\r\n");    soc =  http_open_socket(port);    if(!soc) exit(0);    send(socket: soc, data: s);    r = http_recv(socket: soc);    http_close_socket(soc);    if (egrep(pattern:"input type=.*name=.referer.*<script>foo</script>", string:r) )    {       security_warning(port);    }  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -