mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 20:51:30 +00:00
Updates script to detect other vulnerable services and removes useless redirection ports from the execution rule. See GH#876
This commit is contained in:
@@ -80,7 +80,7 @@ author = "Andrew Orr"
|
|||||||
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
|
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
|
||||||
categories = { "vuln", "auth", "exploit" }
|
categories = { "vuln", "auth", "exploit" }
|
||||||
|
|
||||||
portrule = shortport.port_or_service({623, 664, 16992, 16993, 16994, 16995}, "amt-soap-http")
|
portrule = shortport.port_or_service({623, 664, 16992, 16993}, "amt-soap-http")
|
||||||
|
|
||||||
action = function(host, port)
|
action = function(host, port)
|
||||||
local vuln = {
|
local vuln = {
|
||||||
@@ -108,7 +108,7 @@ digest parameter.
|
|||||||
local vuln_report = vulns.Report:new(SCRIPT_NAME, host, port)
|
local vuln_report = vulns.Report:new(SCRIPT_NAME, host, port)
|
||||||
local response = http.get(host, port, '/index.htm')
|
local response = http.get(host, port, '/index.htm')
|
||||||
|
|
||||||
if response.header['server'] and response.header['server']:find('Intel(R) Active Management Technology', 1, true)
|
if response.header['server'] and response.header['server']:find('Intel(R)', 1, true)
|
||||||
and response.status and response.status == 401 then
|
and response.status and response.status == 401 then
|
||||||
local www_authenticate = http.parse_www_authenticate(response.header['www-authenticate'])
|
local www_authenticate = http.parse_www_authenticate(response.header['www-authenticate'])
|
||||||
local auth_header = string.format("Digest username=\"admin\", realm=\"%s\", nonce=\"%s\", uri=\"index.htm\"," ..
|
local auth_header = string.format("Digest username=\"admin\", realm=\"%s\", nonce=\"%s\", uri=\"index.htm\"," ..
|
||||||
|
|||||||
Reference in New Issue
Block a user