imp_html_mime_viewer_xss.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 71 行

NASL
71
字号
## This script was written by George A. Theall, <theall@tifaware.com>.## See the Nessus Scripts License for details.#if (description) {  script_id(15393);  script_version("$Revision: 118 $");   name["english"] = "IMP HTML MIME Viewer XSS Vulnerabilities";  script_name(english:name["english"]);   desc["english"] = "The target is running at least one instance of IMP whose version numberis between 3.0 and 3.2.5 inclusive.  Such versions are vulnerable toseveral XSS attacks when viewing HTML messages with the HTML MIME viewerand certain browsers.  For additional information, see the 3.2.6 releaseannouncement:  http://lists.horde.org/archives/imp/Week-of-Mon-20040920/039246.html***** OpenVAS has determined the vulnerability exists on the target***** simply by looking at the version number of IMP installed there.Solution : Upgrade to IMP version 3.2.6 or later. Risk factor : Medium";  script_description(english:desc["english"]);   summary["english"] = "Checks for HTML MIME Viewer XSS vulnerabilities in IMP";  script_summary(english:summary["english"]);   script_category(ACT_GATHER_INFO);  script_copyright(english:"This script is Copyright (C) 2003-2004 George A. Theall");  family["english"] = "CGI abuses : XSS";  script_family(english:family["english"]);  script_dependencie("global_settings.nasl", "imp_detect.nasl");  script_require_ports("Services/www", 80);  exit(0);}include("global_settings.inc");include("http_func.inc");host = get_host_name();port = get_http_port(default:80);if (debug_level) display("debug: searching for HTML MIME Viewer XSS vulnerability in IMP on ", host, ":", port, ".\n");if (!get_port_state(port)) exit(0);# Check each installed instance, stopping if we find a vulnerability.installs = get_kb_list(string("www/", port, "/imp"));if (isnull(installs)) exit(0);foreach install (installs) {  matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");  if (!isnull(matches)) {    ver = matches[1];    dir = matches[2];    if (debug_level) display("debug: checking version ", ver, " under ", dir, ".\n");    if (ereg(pattern:"^3\.(0|1|2|2\.[1-5])$", string:ver)) {      security_warning(port);      exit(0);    }  }}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?