mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 04:09:01 +00:00
Fix NSEdoc: wrap lines, fix bulleted lists
This commit is contained in:
@@ -1,21 +1,28 @@
|
||||
description=[[
|
||||
Crawls a web server and attempts to find PHP files vulnerable to reflected cross site scripting via the variable $_SERVER["PHP_SELF"].
|
||||
Crawls a web server and attempts to find PHP files vulnerable to reflected
|
||||
cross site scripting via the variable <code>$_SERVER["PHP_SELF"]</code>.
|
||||
|
||||
This script crawls the webserver to create a list of PHP files and then sends an attack vector/probe to identify PHP_SELF cross site scripting vulnerabilities.
|
||||
PHP_SELF XSS refers to reflected cross site scripting vulnerabilities caused by the lack of sanitation of the variable <code>$_SERVER["PHP_SELF"]</code> in PHP scripts. This variable is
|
||||
commonly used in php scripts that display forms and when the script file name is needed.
|
||||
This script crawls the webserver to create a list of PHP files and then sends
|
||||
an attack vector/probe to identify PHP_SELF cross site scripting
|
||||
vulnerabilities. PHP_SELF XSS refers to reflected cross site scripting
|
||||
vulnerabilities caused by the lack of sanitation of the variable
|
||||
<code>$_SERVER["PHP_SELF"]</code> in PHP scripts. This variable is commonly
|
||||
used in PHP scripts that display forms and when the script file name is
|
||||
needed.
|
||||
|
||||
Examples of Cross Site Scripting vulnerabilities in the variable $_SERVER[PHP_SELF]:
|
||||
*http://www.securityfocus.com/bid/37351
|
||||
*http://software-security.sans.org/blog/2011/05/02/spot-vuln-percentage
|
||||
*http://websec.ca/advisories/view/xss-vulnerabilities-mantisbt-1.2.x
|
||||
* http://www.securityfocus.com/bid/37351
|
||||
* http://software-security.sans.org/blog/2011/05/02/spot-vuln-percentage
|
||||
* http://websec.ca/advisories/view/xss-vulnerabilities-mantisbt-1.2.x
|
||||
|
||||
The attack vector/probe used is: <code>/'"/><script>alert(1)</script></code>
|
||||
]]
|
||||
|
||||
---
|
||||
-- @usage
|
||||
-- nmap --script=http-phpself-xss -p80 <target>
|
||||
-- nmap -sV --script http-self-xss <target>
|
||||
--
|
||||
-- @output
|
||||
-- PORT STATE SERVICE REASON
|
||||
-- 80/tcp open http syn-ack
|
||||
@@ -37,6 +44,7 @@ The attack vector/probe used is: <code>/'"/><script>alert(1)</script></code>
|
||||
-- | References:
|
||||
-- | https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
|
||||
-- |_ http://php.net/manual/en/reserved.variables.server.php
|
||||
--
|
||||
-- @args http-phpself-xss.uri URI. Default: /
|
||||
-- @args http-phpself-xss.timeout Spidering timeout. (default 10s)
|
||||
author = "Paulino Calderon <calderon@websec.mx>"
|
||||
|
||||
Reference in New Issue
Block a user