1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Adds script http-bigip-cookie. Closes #892

This commit is contained in:
nnposter
2017-08-17 16:29:10 +00:00
parent 9e0f05a0f5
commit b2fb0b25ad
3 changed files with 88 additions and 0 deletions

View File

@@ -4,6 +4,10 @@ o [GH#926] The rarity level of MS SQL's service detection probe was decreased.
Now we can find MS SQL in odd ports without increasing version intensity.
[Paulino Calderon]
o [NSE][GH#892] New script http-bigip-cookie decodes unencrypted F5 BIG-IP
cookies and reports back the IP address and port of the actual server behind
the load-balancer. [Seth Jackson]
o [NSE] New script http-jsonp-detection Attempts to discover JSONP endpoints in
web servers. JSONP endpoints can be used to bypass Same-origin Policy
restrictions in web browsers. [Vinamra Bhatia]

View File

@@ -0,0 +1,83 @@
description = [[
Decodes any unencrypted F5 BIG-IP cookies in the HTTP response.
BIG-IP cookies contain information on backend systems such as
internal IP addresses and port numbers.
See here for more info: https://support.f5.com/csp/article/K6917
]]
local http = require "http"
local shortport = require "shortport"
local stdnse = require "stdnse"
local table = require "table"
---
-- @usage
-- nmap -p <port> --script http-bigip-cookie <target>
--
-- @output
-- PORT STATE SERVICE
-- 80/tcp open http
-- | http-bigip-cookie:
-- | BIGipServer<pool_name>:
-- | address:
-- | host: 10.1.1.100
-- | type: ipv4
-- |_ port: 8080
--
-- @xmloutput
-- <table key="BIGipServer<pool_name>">
-- <table key="address">
-- <elem key="host">10.1.1.100</elem>
-- <elem key="type">ipv4</elem>
-- </table>
-- <elem key="port">8080</elem>
-- </table>
--
-- @args http-bigip-cookie.path The URL path to request. The default path is "/".
author = "Seth Jackson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = { "discovery", "safe" }
portrule = shortport.http
action = function(host, port)
local path = stdnse.get_script_args(SCRIPT_NAME..".path") or "/"
local response = http.get(host, port, path, { redirect_ok = false })
if not response then
return
end
if not response.cookies then
return
end
local output = stdnse.output_table()
for _, cookie in ipairs(response.cookies) do
if cookie.name:find("BIGipServer") then
local host, port = cookie.value:match("^(%d+)%.(%d+)%.")
if host and tonumber(host) < 0x100000000 and tonumber(port) < 0x10000 then
host = table.concat({("BBBB"):unpack(("<I4"):pack(host))}, ".", 1, 4)
port = (">I2"):unpack(("<I2"):pack(port))
local result = {
address = {
host = host,
type = "ipv4"
},
port = port
}
output[cookie.name] = result
end
end
end
if #output > 0 then
return output
end
end

View File

@@ -159,6 +159,7 @@ Entry { filename = "http-awstatstotals-exec.nse", categories = { "exploit", "int
Entry { filename = "http-axis2-dir-traversal.nse", categories = { "exploit", "intrusive", "vuln", } }
Entry { filename = "http-backup-finder.nse", categories = { "discovery", "safe", } }
Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "exploit", "intrusive", } }
Entry { filename = "http-bigip-cookie.nse", categories = { "discovery", "safe", } }
Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } }
Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } }
Entry { filename = "http-chrono.nse", categories = { "discovery", "intrusive", } }