httpd_boa.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 71 行
NASL
71 行
## This script was written by Thomas Reinke <reinke@cvs.nessus.org>## See the Nessus Scripts License for details#if(description){ script_id(10527); script_bugtraq_id(1770); script_version ("$Revision: 38 $"); script_cve_id("CVE-2000-0920"); name["english"] = "Boa file retrieval"; script_name(english:name["english"]); desc["english"] = "The remote Boa serverallows an attacker to read arbitrary fileson the remote web server, prefixing thepathname of the file with hex-encoded../../..Example: GET /%2e%2e/%2e%2e/%2e%2e/etc/passwd will return /etc/passwd.Solution: upgrade to a later version of theserver found at http://www.boa.orgRisk factor : High"; script_description(english:desc["english"]); summary["english"] = "Boa file retrieval"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2000 Thomas Reinke"); family["english"] = "Remote file access"; family["francais"] = "Acc鑣 aux fichiers distants"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes"); script_require_ports("Services/www", 80); exit(0);}## The script code starts here#include("http_func.inc");port = get_http_port(default:80);if(get_port_state(port)){ soc = http_open_socket(port); if(soc) { buf = string("/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"); buf = http_get(item:buf, port:port); send(socket:soc, data:buf); rep = http_recv(socket:soc); if(("root:" >< rep) && ("Boa/" >< rep) ) security_hole(port); http_close_socket(soc); }}
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?