Script http-frontpage-login
Script types:
portrule
Categories:
vuln, safe
Download: https://svn.nmap.org/nmap/scripts/http-frontpage-login.nse
Script Summary
Checks whether target machines are vulnerable to anonymous Frontpage login.
Older, default configurations of Frontpage extensions allow remote user to login anonymously which may lead to server compromise.
Script Arguments
- http-frontpage-login.path
Path prefix to Frontpage directories. Defaults to root ("/").
- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- vulns.short, vulns.showall
See the documentation for the vulns library.
Example Usage
nmap <target> -p 80 --script=http-frontpage-login
Script Output
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-frontpage-login: | VULNERABLE: | Frontpage extension anonymous login | State: VULNERABLE | Description: | Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise. | | References: |_ http://insecure.org/sploits/Microsoft.frontpage.insecurities.html
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html