⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 iis_viewcode.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by John Lampe (j_lampe@bellsouth.net)### See the Nessus Scripts License for details#if(description){  script_id(10576);  script_cve_id("CVE-1999-0737");  script_version ("$Revision: 38 $");  script_name(english:"Check for dangerous IIS default files");  desc["english"] = "The file viewcode.asp is a default IIS files which can give a malicious user a lot of unnecessary information about your file system or source files.  Specifically, viewcode.asp can allow aremote user to potentially read any file on a webserver hard drive.Example,http://target/pathto/viewcode.asp?source=../../../../../../autoexec.batSolution : If you do not need these files, then delete them, otherwiseuse suitable access control lists to ensure that the files are notworld-readable.Risk factor : High";  script_description(english:desc["english"]);  script_summary(english:"Check for existence of viewcode.asp");  script_category(ACT_GATHER_INFO);  script_family(english:"Web Servers");  script_copyright(english:"By John Lampe....j_lampe@bellsouth.net");  script_dependencies("find_service.nes", "http_version.nasl", "www_fingerprinting_hmap.nasl");  script_require_ports("Services/www", 80);     exit(0);}## The script code starts hereinclude("http_func.inc");include("http_keepalive.inc");include("global_settings.inc");if ( report_paranoia < 2 ) exit(0);port = get_http_port(default:80);if ( ! can_host_asp(port:port) ) exit(0);		fl[0] = "/Sites/Knowledge/Membership/Inspired/ViewCode.asp";fl[1] = "/Sites/Knowledge/Membership/Inspiredtutorial/Viewcode.asp";fl[2] = "/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp";fl[3] = "/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp";fl[4] = "/Sites/Samples/Knowledge/Push/ViewCode.asp";fl[5] = "/Sites/Samples/Knowledge/Search/ViewCode.asp";fl[6] = "/SiteServer/Publishing/viewcode.asp";   list = "";for(i=0;fl[i];i=i+1){  url = fl[i]; if(is_cgi_installed_ka(item:url, port:port))  {   list = string(list, "\n", url);  } }  if(strlen(list)){ mywarning = string("The following files were found on the remote\n", 			"web server : ", list,   	 		"\nThese files allow anyone to read arbitrary files on the remote host\n",    		"Example, http://your.url.com/pathto/viewcode.asp?source=../../../../autoexec.bat\n",    		"\n\nSolution : delete these files\n",    		"Risk factor : High"); security_warning(port:port, data:mywarning); }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -