On Thu, Jun 09, 2011 at 06:33:47PM -0700, Paulino Calderon wrote:
Here is my NSE script for exploiting the directory traversal
vulnerability recently found in Majordomo2 (CVE-2011-0049) .
Thanks Paulino, this looks good! The only issue I found was when
running against a patched host:
PORT STATE SERVICE
80/tcp open http
|_http-majordomo2-dir-traversal: [Error] File was not found or the web server has insufficient permissions
As we gain more and more vuln detection scripts, there is a risk that
we might flood the user with "not vulnerable" reports which make the
actual vulnerabilities harder to spot. So would you make this message
only show up in debugging mode (or maybe when verbosity is 2 or
Also, would you revise the error message to note that the server may
be patched, and also include the file name (like "Target file
(/etc/passwd) was not found...") so it is more clear what went wrong?
And can you include the exploit URL that was attempted too? Again,
these are all only going to show in debug mode or if verbosity is high
Once you make these changes, please check it in.
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/