mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 08:59:01 +00:00
Adds http-barracuda-dir-traversal -
Attempts to retrieve the configuration settings from the MySQL database dump on a Barracuda Networks Spam & Virus Firewall device using the directory traversal vulnerability in the "locale" parameter of "/cgi-mod/view_help.cgi" or "/cgi-bin/view_help.cgi". The web administration interface runs on port 8000 by default. Barracuda Networks Spam & Virus Firewall <= 4.1.1.021 Remote Configuration Retrieval Original exploit by ShadowHatesYou <Shadow@SquatThis.net> For more information, see: http://seclists.org/fulldisclosure/2010/Oct/119 http://www.exploit-db.com/exploits/15130/
This commit is contained in:
@@ -60,6 +60,7 @@ Entry { filename = "hddtemp-info.nse", categories = { "default", "discovery", "s
|
||||
Entry { filename = "hostmap.nse", categories = { "discovery", "external", "intrusive", } }
|
||||
Entry { filename = "http-affiliate-id.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "http-auth.nse", categories = { "auth", "default", "safe", } }
|
||||
Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "exploit", "intrusive", } }
|
||||
Entry { filename = "http-brute.nse", categories = { "auth", "intrusive", } }
|
||||
Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "http-date.nse", categories = { "discovery", "safe", } }
|
||||
|
||||
Reference in New Issue
Block a user