Script http-vuln-cve2010-0738
Script types:
portrule
Categories:
safe, auth, vuln
Download: https://svn.nmap.org/nmap/scripts/http-vuln-cve2010-0738.nse
Script Summary
Tests whether a JBoss target is vulnerable to jmx console authentication bypass (CVE-2010-0738).
It works by checking if the target paths require authentication or redirect to a login page that could be bypassed via a HEAD request. RFC 2616 specifies that the HEAD request should be treated exactly like GET but with no returned response body. The script also detects if the URL does not require authentication at all.
For more information, see:
- CVE-2010-0738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738
- http://www.imperva.com/resources/glossary/http_verb_tampering.html
- https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
Script Arguments
- http-vuln-cve2010-0738.paths
Array of paths to check. Defaults to
{"/jmx-console/"}
.- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
Example Usage
nmap --script=http-vuln-cve2010-0738 --script-args 'http-vuln-cve2010-0738.paths={/path1/,/path2/}' <target>
Script Output
PORT STATE SERVICE 80/tcp open http | http-vuln-cve2010-0738: |_ /jmx-console/: Authentication bypass.
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html