1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Have http-methods.nse highlight "interesting" methods as "potentially

risky" methods. Provide a link to the NSEDoc and to the OWASP page on
methods for more information.
This commit is contained in:
david
2010-03-02 22:34:11 +00:00
parent ce18e4bb54
commit a90ba28583
2 changed files with 31 additions and 21 deletions

View File

@@ -122,8 +122,9 @@ o [NSE] Replaced incorrect try/catch statements in dns-service-discovery that
o [NSE] Added the script http-methods from Bernd Stroessenreuther. o [NSE] Added the script http-methods from Bernd Stroessenreuther.
This script sends an HTTP OPTIONS request to get the methods This script sends an HTTP OPTIONS request to get the methods
supported by the server, and optionally tests each method to see if supported by the server, highlights potentially risky methods, and
they are restricted by IP address or something similar. optionally tests each method to see if they are restricted by IP
address or something similar.
o Added service probes and UDP payloads for games based on the Quake 2 o Added service probes and UDP payloads for games based on the Quake 2
and Quake 3 engine, submitted by Mak Kolybabi. and Quake 3 engine, submitted by Mak Kolybabi.

View File

@@ -1,13 +1,20 @@
id = "HTTP allowed methods"
description = [[ description = [[
Connects to an HTTP server and sends an OPTIONS request to see which Finds out what options are supported by an HTTP server by sending an
HTTP methods are allowed on this server. Optionally tests each method OPTIONS request. Lists potentially risky methods. Optionally tests each
individually to see if they are subject to e.g. IP address restrictions. method individually to see if they are subject to e.g. IP address
restrictions.
By default, the script will not report anything if the only methods In this script, "potentially risky" methods are anything except GET,
found are GET, HEAD, POST, or OPTIONS. If any other methods are found, HEAD, POST, and OPTIONS. If the script reports potentially risky
or if Nmap is run in verbose mode, then all of them are reported. methods, they may not all be security risks, but you should check to
make sure. This page lists the dangers of some common methods:
http://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_(OWASP-CM-008)
The list of supported methods comes from the contents of the Allow and
Public header fields. In verbose mode, a list of all methods is printed,
followed by the list of potentially risky methods. Without verbose mode,
only the potentially risky methods are shown.
]] ]]
--- ---
@@ -19,8 +26,10 @@ or if Nmap is run in verbose mode, then all of them are reported.
-- possible. -- possible.
-- --
-- @output -- @output
-- 80/tcp open http syn-ack -- 80/tcp open http
-- | http-methods: GET HEAD POST OPTIONS TRACE -- | http-methods: GET HEAD POST OPTIONS TRACE
-- | Potentially risky methods: TRACE
-- | See http://nmap.org/nsedoc/scripts/http-methods.html
-- | GET / -> HTTP/1.1 200 OK -- | GET / -> HTTP/1.1 200 OK
-- | HEAD / -> HTTP/1.1 200 OK -- | HEAD / -> HTTP/1.1 200 OK
-- | POST / -> HTTP/1.1 200 OK -- | POST / -> HTTP/1.1 200 OK
@@ -64,7 +73,6 @@ end
action = function(host, port) action = function(host, port)
local url_path, retest_http_methods local url_path, retest_http_methods
local response, methods, options_status_line, output local response, methods, options_status_line, output
local uninteresting
-- default vaules for script-args -- default vaules for script-args
url_path = nmap.registry.args["http-methods.url-path"] or "/" url_path = nmap.registry.args["http-methods.url-path"] or "/"
@@ -83,20 +91,21 @@ action = function(host, port)
return string.format("No Allow or Public header in OPTIONS response (status code %d)", response.status) return string.format("No Allow or Public header in OPTIONS response (status code %d)", response.status)
end end
if nmap.verbosity() == 0 then
uninteresting = UNINTERESTING_METHODS
else
uninteresting = {}
end
-- The Public header is defined in RFC 2068, but was removed in its -- The Public header is defined in RFC 2068, but was removed in its
-- successor RFC 2616. It is implemented by at least IIS 6.0. -- successor RFC 2616. It is implemented by at least IIS 6.0.
methods = merge_headers(response.header, {"Allow", "Public"}) methods = merge_headers(response.header, {"Allow", "Public"})
if #filter_out(methods, uninteresting) == 0 then
return output = {}
if nmap.verbosity() > 0 then
output[#output + 1] = stdnse.strjoin(" ", methods)
end end
output = { stdnse.strjoin(" ", methods) } local interesting = filter_out(methods, UNINTERESTING_METHODS)
if #interesting > 0 then
output[#output + 1] = "Potentially risky methods: " .. stdnse.strjoin(" ", interesting)
output[#output + 1] = "See http://nmap.org/nsedoc/scripts/http-methods.html"
end
-- retest http methods if requested -- retest http methods if requested
if retest_http_methods then if retest_http_methods then