📄 iis_viewcode.nasl
字号:
## This script was written by John Lampe (j_lampe@bellsouth.net)### See the Nessus Scripts License for details#if(description){ script_id(10576); script_cve_id("CVE-1999-0737"); script_version ("$Revision: 38 $"); script_name(english:"Check for dangerous IIS default files"); desc["english"] = "The file viewcode.asp is a default IIS files which can give a malicious user a lot of unnecessary information about your file system or source files. Specifically, viewcode.asp can allow aremote user to potentially read any file on a webserver hard drive.Example,http://target/pathto/viewcode.asp?source=../../../../../../autoexec.batSolution : If you do not need these files, then delete them, otherwiseuse suitable access control lists to ensure that the files are notworld-readable.Risk factor : High"; script_description(english:desc["english"]); script_summary(english:"Check for existence of viewcode.asp"); script_category(ACT_GATHER_INFO); script_family(english:"Web Servers"); script_copyright(english:"By John Lampe....j_lampe@bellsouth.net"); script_dependencies("find_service.nes", "http_version.nasl", "www_fingerprinting_hmap.nasl"); script_require_ports("Services/www", 80); exit(0);}## The script code starts hereinclude("http_func.inc");include("http_keepalive.inc");include("global_settings.inc");if ( report_paranoia < 2 ) exit(0);port = get_http_port(default:80);if ( ! can_host_asp(port:port) ) exit(0); fl[0] = "/Sites/Knowledge/Membership/Inspired/ViewCode.asp";fl[1] = "/Sites/Knowledge/Membership/Inspiredtutorial/Viewcode.asp";fl[2] = "/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp";fl[3] = "/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp";fl[4] = "/Sites/Samples/Knowledge/Push/ViewCode.asp";fl[5] = "/Sites/Samples/Knowledge/Search/ViewCode.asp";fl[6] = "/SiteServer/Publishing/viewcode.asp"; list = "";for(i=0;fl[i];i=i+1){ url = fl[i]; if(is_cgi_installed_ka(item:url, port:port)) { list = string(list, "\n", url); } } if(strlen(list)){ mywarning = string("The following files were found on the remote\n", "web server : ", list, "\nThese files allow anyone to read arbitrary files on the remote host\n", "Example, http://your.url.com/pathto/viewcode.asp?source=../../../../autoexec.bat\n", "\n\nSolution : delete these files\n", "Risk factor : High"); security_warning(port:port, data:mywarning); }
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -