afp-path-vuln
脚本使用类型:
portrule
脚本所属分类:
exploit, intrusive, vuln
脚本下载地址: http://nmap.org/svn/scripts/afp-path-vuln.nse
Detects the Mac OS X AFP directory traversal vulnerability, CVE-2010-0533.
This script attempts to iterate over all AFP shares on the remote host. For each share it attempts to access the parent directory by exploiting the directory traversal vulnerability as described in CVE-2010-0533.
The script reports whether the system is vulnerable or not. In addition it lists the contents of the parent and child directories to a max depth of 2. When running in verbose mode, all items in the listed directories are shown. In non verbose mode, output is limited to the first 5 items. If the server is not vulnerable, the script will not return any information.
For additional information:
执行格式
nmap -sV --script=afp-path-vuln <target>
PORT STATE SERVICE 548/tcp open afp | afp-path-vuln: | VULNERABLE: | Apple Mac OS X AFP server directory traversal | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2010-0533 | Risk factor: High CVSSv2: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Description: | Directory traversal vulnerability in AFP Server in Apple Mac OS X before | 10.6.3 allows remote attackers to list a share root's parent directory. | Disclosure date: 2010-03-29 | Exploit results: | Patrik Karlsson's Public Folder/../ (5 first items) | .bash_history | .bash_profile | .CFUserTextEncoding | .config/ | .crash_report_checksum | References: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0533 | http://support.apple.com/kb/HT1222 |_ http://www.cqure.net/wp/2010/03/detecting-apple-mac-os-x-afp-vulnerability-cve-2010-0533-with-nmap
Author: Patrik Karlsson
License: VER007 整理 http://www.ver007.com