Script http-frontpage-login

Script types: portrule
Categories: vuln, safe
Download: https://svn.nmap.org/nmap/scripts/http-frontpage-login.nse

Script Summary

Checks whether target machines are vulnerable to anonymous Frontpage login.

Older, default configurations of Frontpage extensions allow remote user to login anonymously which may lead to server compromise.

Script Arguments

http-frontpage-login.path

Path prefix to Frontpage directories. Defaults to root ("/").

slaxml.debug

See the documentation for the slaxml library.

http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent

See the documentation for the http library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

vulns.short, vulns.showall

See the documentation for the vulns library.

Example Usage

nmap <target> -p 80 --script=http-frontpage-login

Script Output

PORT   STATE SERVICE REASON
80/tcp open  http    syn-ack
| http-frontpage-login:
|   VULNERABLE:
|   Frontpage extension anonymous login
|     State: VULNERABLE
|     Description:
|       Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
|
|     References:
|_      http://insecure.org/sploits/Microsoft.frontpage.insecurities.html

Requires


Author:

  • Aleksandar Nikolic

License: Same as Nmap--See https://nmap.org/book/man-legal.html