Script http-vuln-misfortune-cookie

Script types: portrule
Categories: vuln, intrusive
Download: https://svn.nmap.org/nmap/scripts/http-vuln-misfortune-cookie.nse

Script Summary

Detects the RomPager 4.07 Misfortune Cookie vulnerability by safely exploiting it.

See also:

Script Arguments

slaxml.debug

See the documentation for the slaxml library.

http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent

See the documentation for the http library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

vulns.short, vulns.showall

See the documentation for the vulns library.

Example Usage

nmap <target> -p 7547 --script=http-vuln-misfortune-cookie

Script Output

PORT   STATE SERVICE REASON
7547/tcp open  unknown syn-ack
| http-vuln-misfortune-cookie:
|   VULNERABLE:
|   RomPager 4.07 Misfortune Cookie
|     State: VULNERABLE
|     IDs:  BID:71744  CVE:CVE-2014-9222
|     Description:
| The cookie handling routines in RomPager 4.07 are vulnerable to remote code
| execution. This script has verified the vulnerability by exploiting the web
| server in a safe manner.
|     References:
|       http://www.kb.cert.org/vuls/id/561444
|       http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf
|       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9222
|       http://www.checkpoint.com/blog/fortune-cookie-hole-internet-gateway/index.html
|_      http://www.securityfocus.com/bid/71744

Requires


Author:

  • Andrew Orr

License: Same as Nmap--See https://nmap.org/book/man-legal.html