⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 exchange_public_folders_information_leak.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## Copyright 2000 by Noam Rathaus <noamr@securiteam.com>## See the Nessus Scripts License for details##if(description){ script_id(10755); script_bugtraq_id(3301); script_cve_id("CVE-2001-0660"); script_version ("$Revision: 38 $"); name["english"] = "Microsoft Exchange Public Folders Information Leak"; script_name(english:name["english"]); desc["english"] = "Microsoft Exchange Public Folders can be set to allow anonymous connections (set by default). If this is not changed it is possible foran attacker to gain critical information about the users (such as full email address, phone number, etc) that are present in the Exchange Server.Risk factor : MediumAdditional information:http://www.securiteam.com/windowsntfocus/5WP091P5FQ.html"; script_description(english:desc["english"]); summary["english"] = "Microsoft Exchange Public Folders Information Leak"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2001 SecuriTeam"); family["english"] = "General"; script_family(english:family["english"]); script_dependencie("find_service.nes", "http_version.nasl", "www_fingerprinting_hmap.nasl"); script_require_ports("Services/www", 80); exit(0);}## The script code starts here#include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if ( ! get_port_state(port) ) exit(0);if ( ! can_host_asp(port:port) ) exit(0);res = is_cgi_installed_ka(item:"/exchange/root.asp", port:port);if (res){ Host = ""; if (get_host_name()) {  Host = get_host_name(); } else {  Host = get_host_ip(); }  #display(Host, "\n"); if (Host) {  first = http_get(item:"/exchange/root.asp?acs=anon", port:port);  soctcp80 = http_open_socket(port);  if (soctcp80)  {   send(socket:soctcp80, data:first);   result = http_recv(socket:soctcp80);   SetCookie = 0;   #display(result);      if ((egrep(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:result)) && ("Set-Cookie: " >< result) && ("top.location='/exchange/logonfrm.asp'" >< result))   {    #display("Done First step\n");    SetCookie = strstr(result, "Set-Cookie: ");    resultsub = strstr(SetCookie, "; path=/");    SetCookie = SetCookie - "Set-Cookie: ";    SetCookie = SetCookie - resultsub;    #display("Cookie: ", SetCookie, "\n");    second = string("GET /exchange/logonfrm.asp HTTP/1.1\r\nHost: ", Host, "\r\nCookie: ", SetCookie, "\r\n\r\n");        send(socket:soctcp80, data:second);    result = http_recv(socket:soctcp80);    #display(result);    if ((egrep(pattern:"^HTTP/[0-9]\.[0-9] 302 .*", string:result)) && ("Location: /exchange/root.asp?acs=anon" >< result))    {     #display("Done Second step\n");     third = string("GET /exchange/root.asp?acs=anon HTTP/1.1\r\nHost: ", Host, "\r\nCookie: ", SetCookie, "\r\n\r\n");     send(socket:soctcp80, data:third);     result = http_recv(socket:soctcp80);     #display(result);     if ((egrep(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:result)) && ("/exchange/Navbar/nbAnon.asp" >< result))     {      #display("Done Third step\n");      final = string("POST /exchange/finduser/fumsg.asp HTTP/1.1\r\nHost: ", Host, "\r\nAccept: */*\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 44\r\nCookie: ", SetCookie, "\r\n\r\nDN=a&FN=&LN=&TL=&AN=&CP=&DP=&OF=&CY=&ST=&CO=");      send(socket:soctcp80, data:final);      result = http_recv(socket:soctcp80);      http_close_socket(soctcp80);      #display(result);      if ((egrep(pattern:"^HTTP/[0-9]\.[0-9] 200 .*", string:result)) && (("details.asp?obj=" >< result) || ("This query would return" >< result)) )      {       security_warning(port:port);      }     }    }   }  } }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -