Nmap Development mailing list archives
Re: http-majordomo2-dir-traversal.nse
From: Fyodor <fyodor () insecure org>
Date: Mon, 27 Jun 2011 12:45:40 -0700
On Thu, Jun 09, 2011 at 06:33:47PM -0700, Paulino Calderon wrote:
Hello nmap-dev, Here is my NSE script for exploiting the directory traversal vulnerability recently found in Majordomo2 (CVE-2011-0049) .
Thanks Paulino, this looks good! The only issue I found was when running against a patched host: PORT STATE SERVICE 80/tcp open http |_http-majordomo2-dir-traversal: [Error] File was not found or the web server has insufficient permissions As we gain more and more vuln detection scripts, there is a risk that we might flood the user with "not vulnerable" reports which make the actual vulnerabilities harder to spot. So would you make this message only show up in debugging mode (or maybe when verbosity is 2 or higher?). Also, would you revise the error message to note that the server may be patched, and also include the file name (like "Target file (/etc/passwd) was not found...") so it is more clear what went wrong? And can you include the exploit URL that was attempted too? Again, these are all only going to show in debug mode or if verbosity is high enough. Once you make these changes, please check it in. Thanks, Fyodor _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- http-majordomo2-dir-traversal.nse Paulino Calderon (Jun 09)
- Re: http-majordomo2-dir-traversal.nse Fyodor (Jun 27)
- Re: http-majordomo2-dir-traversal.nse Paulino Calderon (Jun 27)
- Re: http-majordomo2-dir-traversal.nse Fyodor (Jun 27)