1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-08 23:49:03 +00:00
paulino c43e0bb970 Added http-litespeed-sourcecode-download:
http-litespeed-sourcecode-download.nse exploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.x before 4.0.15 to retrieve the target script's source code by sending a HTTP request with a null byte followed by a .txt file extension (CVE-2010-2333).

If the server is not vulnerable it returns an error 400. If index.php is not found, you may try /phpinfo.php which is also shipped with LiteSpeed Web Server. The attack payload looks like this:
* <code>/index.php\00.txt</code>

References:
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2333
* http://www.exploit-db.com/exploits/13850/
2011-07-24 20:13:42 +00:00
2011-06-30 22:38:52 +00:00
2011-06-30 22:38:52 +00:00
2011-07-22 21:55:18 +00:00
2010-05-23 17:42:44 +00:00
2011-05-21 01:30:50 +00:00
2011-06-29 04:47:02 +00:00
2011-01-21 20:59:10 +00:00
2011-06-14 19:46:48 +00:00
2008-07-31 14:18:21 +00:00
2011-06-14 02:29:41 +00:00
2011-06-14 02:29:41 +00:00
2011-07-19 23:42:33 +00:00
2011-07-19 21:40:32 +00:00
2011-07-19 23:42:33 +00:00
2011-06-14 19:46:43 +00:00

Here is some documentation for Nmap, but these files are much less
comprehensive than what you'll find at the actual Nmap documentation
site ( http://nmap.org ).
Languages
C 37.8%
Lua 28.1%
C++ 16.7%
Shell 5.8%
Python 4.2%
Other 7.2%