top of page
作家相片Samuel

Nmap NSE Category vulns Script:smb-vuln-webexec ebExService(WebExec)存在一個關鍵的遠程代碼執行漏洞

已更新:8月6日


Nmap Script摘要


WebExService(WebExec)存在一個關鍵的遠程代碼執行漏洞。


另見:

smb-webexec-exploit.nse


Nmap Script參數


smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

參見smbauth庫的文檔。

randomseed, smbbasic, smbport, smbsign

參見smb庫的文檔。

vulns.short, vulns.showall

參見vulns庫的文檔。


Nmap Script範例


nmap --script smb-vuln-webexec --script-args smbusername=<username>,smbpass=<password> -p445 <host>

Nmap Script輸出

PORT    STATE SERVICE      REASON
445/tcp open  microsoft-ds syn-ack
| smb-vuln-webexec:
|   VULNERABLE:
|   Remote Code Execution vulnerability in WebExService
|     State: VULNERABLE
|     IDs:  CVE:CVE-2018-15442
|     Risk factor: HIGH
|       A critical remote code execution vulnerability exists in WebExService (WebExec).
|     Disclosure date: 2018-10-24
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15442
|       https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
|_      https://webexec.org

Nmap Script作者:

Ron Bowes

License: Same as Nmap--See https://nmap.org/book/man-legal.html


Nmap
Nmap

 

延伸閱讀

2 次查看

Comments


bottom of page