Nmap Development mailing list archives
Checking for jboss authentication bypass
From: Martin Holst Swende <martin () swende se>
Date: Tue, 06 Dec 2011 12:46:19 +0100
Hi list, I threw together a script to check if a server is vulnerable to jboss authentication bypass. It makes a get request to /jmx-console first to see if it is a jboss and whether it requires authentication. If it is and does, it tries a head-request. A http 500 response means it is vulnerable. As I wrote it, I copy-pasted a bit from other http-scripts. I was wondering; is this the correct way to do it if I want it to be able to work also against http or http-alt tunneled over https ? Regards, Martin Holst Swende
Attachment:
http-vuln-cve2010-0738.nse
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Checking for jboss authentication bypass Martin Holst Swende (Dec 06)
- Re: Checking for jboss authentication bypass Hani Benhabiles (Dec 06)
- Re: Checking for jboss authentication bypass Martin Holst Swende (Dec 06)
- Re: Checking for jboss authentication bypass Martin Holst Swende (Dec 06)
- Re: Checking for jboss authentication bypass Martin Holst Swende (Dec 06)
- Re: Checking for jboss authentication bypass Hani Benhabiles (Dec 06)
- Re: Checking for jboss authentication bypass Patrik Karlsson (Dec 08)
- Re: Checking for jboss authentication bypass Martin Holst Swende (Dec 06)
- Re: Checking for jboss authentication bypass Hani Benhabiles (Dec 06)