mirror of
https://github.com/nmap/nmap.git
synced 2026-01-05 22:19:03 +00:00
Re-indent some scripts. Whitespace-only commit
https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
@@ -21,9 +21,9 @@ which can be specified with smb library arguments smbuser and
|
||||
smbpassword.
|
||||
|
||||
References:
|
||||
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729
|
||||
- http://technet.microsoft.com/en-us/security/bulletin/MS10-061
|
||||
- http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx
|
||||
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729
|
||||
- http://technet.microsoft.com/en-us/security/bulletin/MS10-061
|
||||
- http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx
|
||||
]]
|
||||
---
|
||||
-- @usage nmap -p 445 <target> --script=smb-vuln-ms10-061
|
||||
@@ -58,113 +58,113 @@ license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
||||
categories = {"vuln","intrusive"}
|
||||
|
||||
hostrule = function(host)
|
||||
return smb.get_port(host) ~= nil
|
||||
return smb.get_port(host) ~= nil
|
||||
end
|
||||
|
||||
action = function(host,port)
|
||||
|
||||
local ms10_061 = {
|
||||
title = "Print Spooler Service Impersonation Vulnerability",
|
||||
IDS = {CVE = 'CVE-2010-2729'},
|
||||
risk_factor = "HIGH",
|
||||
scores = {
|
||||
CVSSv2 = "9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)",
|
||||
},
|
||||
description = [[
|
||||
local ms10_061 = {
|
||||
title = "Print Spooler Service Impersonation Vulnerability",
|
||||
IDS = {CVE = 'CVE-2010-2729'},
|
||||
risk_factor = "HIGH",
|
||||
scores = {
|
||||
CVSSv2 = "9.3 (HIGH) (AV:N/AC:M/Au:N/C:C/I:C/A:C)",
|
||||
},
|
||||
description = [[
|
||||
The Print Spooler service in Microsoft Windows XP,Server 2003 SP2,Vista,Server 2008, and 7, when printer sharing is enabled,
|
||||
does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory,
|
||||
and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010,
|
||||
aka "Print Spooler Service Impersonation Vulnerability."
|
||||
]],
|
||||
references = {
|
||||
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729',
|
||||
'http://technet.microsoft.com/en-us/security/bulletin/MS10-061',
|
||||
'http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx'
|
||||
},
|
||||
dates = {
|
||||
disclosure = {year = '2010', month = '09', day = '5'},
|
||||
},
|
||||
exploit_results = {},
|
||||
}
|
||||
local report = vulns.Report:new(SCRIPT_NAME, host, port)
|
||||
ms10_061.state = vulns.STATE.NOT_VULN
|
||||
local status, smbstate
|
||||
status, smbstate = msrpc.start_smb(host, msrpc.SPOOLSS_PATH,true)
|
||||
if(status == false) then
|
||||
stdnse.print_debug("SMB: " .. smbstate)
|
||||
return false, smbstate
|
||||
end
|
||||
]],
|
||||
references = {
|
||||
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729',
|
||||
'http://technet.microsoft.com/en-us/security/bulletin/MS10-061',
|
||||
'http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx'
|
||||
},
|
||||
dates = {
|
||||
disclosure = {year = '2010', month = '09', day = '5'},
|
||||
},
|
||||
exploit_results = {},
|
||||
}
|
||||
local report = vulns.Report:new(SCRIPT_NAME, host, port)
|
||||
ms10_061.state = vulns.STATE.NOT_VULN
|
||||
local status, smbstate
|
||||
status, smbstate = msrpc.start_smb(host, msrpc.SPOOLSS_PATH,true)
|
||||
if(status == false) then
|
||||
stdnse.print_debug("SMB: " .. smbstate)
|
||||
return false, smbstate
|
||||
end
|
||||
|
||||
local bind_result
|
||||
status, bind_result = msrpc.bind(smbstate,msrpc.SPOOLSS_UUID, msrpc.SPOOLSS_VERSION, nil)
|
||||
if(status == false) then
|
||||
msrpc.stop_smb(smbstate)
|
||||
stdnse.print_debug("SMB: " .. bind_result)
|
||||
return false, bind_result
|
||||
end
|
||||
local printer = stdnse.get_script_args(SCRIPT_NAME .. '.printer')
|
||||
-- if printer not set find available printers
|
||||
if not printer then
|
||||
stdnse.print_debug("No printer specified, trying to find one...")
|
||||
local lanman_result
|
||||
local REMSmb_NetShareEnum_P = "WrLeh"
|
||||
local REMSmb_share_info_1 = "B13BWz"
|
||||
status, lanman_result = msrpc.call_lanmanapi(smbstate,0,REMSmb_NetShareEnum_P,REMSmb_share_info_1,bin.pack("ss",0x01,65406))
|
||||
if status == false then
|
||||
stdnse.print_debug("SMB: " .. lanman_result)
|
||||
stdnse.print_debug("SMB: Looks like LANMAN API is not available. Try setting printer script arg.")
|
||||
end
|
||||
local bind_result
|
||||
status, bind_result = msrpc.bind(smbstate,msrpc.SPOOLSS_UUID, msrpc.SPOOLSS_VERSION, nil)
|
||||
if(status == false) then
|
||||
msrpc.stop_smb(smbstate)
|
||||
stdnse.print_debug("SMB: " .. bind_result)
|
||||
return false, bind_result
|
||||
end
|
||||
local printer = stdnse.get_script_args(SCRIPT_NAME .. '.printer')
|
||||
-- if printer not set find available printers
|
||||
if not printer then
|
||||
stdnse.print_debug("No printer specified, trying to find one...")
|
||||
local lanman_result
|
||||
local REMSmb_NetShareEnum_P = "WrLeh"
|
||||
local REMSmb_share_info_1 = "B13BWz"
|
||||
status, lanman_result = msrpc.call_lanmanapi(smbstate,0,REMSmb_NetShareEnum_P,REMSmb_share_info_1,bin.pack("ss",0x01,65406))
|
||||
if status == false then
|
||||
stdnse.print_debug("SMB: " .. lanman_result)
|
||||
stdnse.print_debug("SMB: Looks like LANMAN API is not available. Try setting printer script arg.")
|
||||
end
|
||||
|
||||
local parameters = lanman_result.parameters
|
||||
local data = lanman_result.data
|
||||
local pos, status, convert, entry_count, available_entries = bin.unpack("<SSSS", parameters)
|
||||
pos = 0
|
||||
local share_type, name, _
|
||||
for i = 1, entry_count, 1 do
|
||||
_,share_type = bin.unpack(">s",data,pos+14)
|
||||
pos, name = bin.unpack("<z", data, pos)
|
||||
local parameters = lanman_result.parameters
|
||||
local data = lanman_result.data
|
||||
local pos, status, convert, entry_count, available_entries = bin.unpack("<SSSS", parameters)
|
||||
pos = 0
|
||||
local share_type, name, _
|
||||
for i = 1, entry_count, 1 do
|
||||
_,share_type = bin.unpack(">s",data,pos+14)
|
||||
pos, name = bin.unpack("<z", data, pos)
|
||||
|
||||
-- pos needs to be rounded to the next even multiple of 20
|
||||
pos = pos + ( 20 - (#name % 20) ) - 1
|
||||
if share_type == 1 then -- share is printer
|
||||
stdnse.print_debug("Found printer share %s.", name)
|
||||
printer = name
|
||||
end
|
||||
end
|
||||
end
|
||||
if not printer then
|
||||
stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.")
|
||||
return false
|
||||
end
|
||||
stdnse.print_debug("Using %s as printer.",printer)
|
||||
-- call RpcOpenPrinterEx - opnum 69
|
||||
local status, result = msrpc.spoolss_open_printer(smbstate,"\\\\"..host.ip.."\\"..printer)
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local printer_handle = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Printer handle %s",stdnse.tohex(printer_handle))
|
||||
-- call RpcStartDocPrinter - opnum 17
|
||||
status,result = msrpc.spoolss_start_doc_printer(smbstate,printer_handle,",") -- patched version will allow this
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local print_job_id = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Start doc printer job id %s",stdnse.tohex(print_job_id))
|
||||
-- pos needs to be rounded to the next even multiple of 20
|
||||
pos = pos + ( 20 - (#name % 20) ) - 1
|
||||
if share_type == 1 then -- share is printer
|
||||
stdnse.print_debug("Found printer share %s.", name)
|
||||
printer = name
|
||||
end
|
||||
end
|
||||
end
|
||||
if not printer then
|
||||
stdnse.print_debug("No printer found, system may be unpached but it needs at least one printer shared to be vulnerable.")
|
||||
return false
|
||||
end
|
||||
stdnse.print_debug("Using %s as printer.",printer)
|
||||
-- call RpcOpenPrinterEx - opnum 69
|
||||
local status, result = msrpc.spoolss_open_printer(smbstate,"\\\\"..host.ip.."\\"..printer)
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local printer_handle = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Printer handle %s",stdnse.tohex(printer_handle))
|
||||
-- call RpcStartDocPrinter - opnum 17
|
||||
status,result = msrpc.spoolss_start_doc_printer(smbstate,printer_handle,",") -- patched version will allow this
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local print_job_id = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Start doc printer job id %s",stdnse.tohex(print_job_id))
|
||||
|
||||
-- call RpcWritePrinter - 19
|
||||
status, result = msrpc.spoolss_write_printer(smbstate,printer_handle,"aaaa")
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local write_result = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Written %s bytes to a file.",stdnse.tohex(write_result))
|
||||
if stdnse.tohex(write_result) == "00000000" then -- patched version would report 4 bytes written
|
||||
ms10_061.state = vulns.STATE.VULN -- identified by diffing patched an unpatched version
|
||||
end
|
||||
-- call abort_printer to stop the actuall printing in case the remote system is not vulnerable
|
||||
-- we care about the environment and don't want to spend more paper then needed :)
|
||||
status,result = msrpc.spoolss_abort_printer(smbstate,printer_handle)
|
||||
-- call RpcWritePrinter - 19
|
||||
status, result = msrpc.spoolss_write_printer(smbstate,printer_handle,"aaaa")
|
||||
if not status then
|
||||
return false
|
||||
end
|
||||
local write_result = string.sub(result.data,25,#result.data-4)
|
||||
stdnse.print_debug("Written %s bytes to a file.",stdnse.tohex(write_result))
|
||||
if stdnse.tohex(write_result) == "00000000" then -- patched version would report 4 bytes written
|
||||
ms10_061.state = vulns.STATE.VULN -- identified by diffing patched an unpatched version
|
||||
end
|
||||
-- call abort_printer to stop the actuall printing in case the remote system is not vulnerable
|
||||
-- we care about the environment and don't want to spend more paper then needed :)
|
||||
status,result = msrpc.spoolss_abort_printer(smbstate,printer_handle)
|
||||
|
||||
return report:make_output(ms10_061)
|
||||
return report:make_output(ms10_061)
|
||||
end
|
||||
|
||||
Reference in New Issue
Block a user