Nmap Development mailing list archives
http-frontpage-vuln
From: Aleksandar Nikolic <nikolic.alek () gmail com>
Date: Sat, 9 Jun 2012 20:51:17 +0200
I have commited this script as r28891. This one is an oldie but a goodie:) Description and sample output follow: description = [[ Check if target machines are vulnerable to anonymous Frontpage login. Older, default configurations of Frontpage extensions allow remote user to login anonymously which may lead to server compromise. ]] --- -- @usage -- nmap.exe <target> -p 80 --script=http-frontpage-login -- -- @args http-frontpage-login.path Path prefix to Frontpage directories. Defaults -- to root ("/"). -- -- @output -- PORT STATE SERVICE REASON -- 80/tcp open http syn-ack -- | http-frontpage-login: -- | VULNERABLE: -- | Frontpage extension anonymous login -- | State: VULNERABLE -- | Description: -- | Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise. -- | -- | References: -- |_ http://insecure.org/sploits/Microsoft.frontpage.insecurities.html I've tested it against default frontpage extensions installation on win2k IIS server. Aleksandar _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- http-frontpage-vuln Aleksandar Nikolic (Jun 09)