Script http-vuln-misfortune-cookie
Script types:
portrule
Categories:
vuln, intrusive
Download: https://svn.nmap.org/nmap/scripts/http-vuln-misfortune-cookie.nse
Script Summary
Detects the RomPager 4.07 Misfortune Cookie vulnerability by safely exploiting it.
See also:
Script Arguments
- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- vulns.short, vulns.showall
See the documentation for the vulns library.
Example Usage
nmap <target> -p 7547 --script=http-vuln-misfortune-cookie
Script Output
PORT STATE SERVICE REASON 7547/tcp open unknown syn-ack | http-vuln-misfortune-cookie: | VULNERABLE: | RomPager 4.07 Misfortune Cookie | State: VULNERABLE | IDs: BID:71744 CVE:CVE-2014-9222 | Description: | The cookie handling routines in RomPager 4.07 are vulnerable to remote code | execution. This script has verified the vulnerability by exploiting the web | server in a safe manner. | References: | http://www.kb.cert.org/vuls/id/561444 | http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9222 | http://www.checkpoint.com/blog/fortune-cookie-hole-internet-gateway/index.html |_ http://www.securityfocus.com/bid/71744
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html