Class: Yawast::Scanner::Plugins::Servers::Iis
- Inherits:
-
Object
- Object
- Yawast::Scanner::Plugins::Servers::Iis
- Defined in:
- lib/scanner/plugins/servers/iis.rb
Class Method Summary collapse
- .check_all(uri, head) ⇒ Object
- .check_asp_banner(head) ⇒ Object
- .check_asp_net_debug(uri) ⇒ Object
- .check_banner(banner) ⇒ Object
- .check_header_value(head, search, message) ⇒ Object
- .check_mvc_version(head) ⇒ Object
Class Method Details
.check_all(uri, head) ⇒ Object
25 26 27 28 29 30 |
# File 'lib/scanner/plugins/servers/iis.rb', line 25 def self.check_all(uri, head) # run all the defined checks (head) check_mvc_version(head) check_asp_net_debug(uri) end |
.check_asp_banner(head) ⇒ Object
32 33 34 |
# File 'lib/scanner/plugins/servers/iis.rb', line 32 def self.(head) check_header_value head, 'x-aspnet-version', 'ASP.NET' end |
.check_asp_net_debug(uri) ⇒ Object
57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 |
# File 'lib/scanner/plugins/servers/iis.rb', line 57 def self.check_asp_net_debug(uri) begin req = Yawast::Shared::Http.get_http(uri) req.use_ssl = uri.scheme == 'https' headers = Yawast::Shared::Http.get_headers headers['Command'] = 'stop-debug' headers['Accept'] = '*/*' res = req.request(Debug.new('/', headers)) if res.code == 200 Yawast::Utilities.puts_vuln 'ASP.NET Debugging Enabled' Yawast::Shared::Output.log_hash 'vulnerabilities', 'asp_net_debug_enabled', {vulnerable: true, body: res.body, code: res.code} else Yawast::Shared::Output.log_hash 'vulnerabilities', 'asp_net_debug_enabled', {vulnerable: false, body: res.body, code: res.code} end end end |
.check_banner(banner) ⇒ Object
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 |
# File 'lib/scanner/plugins/servers/iis.rb', line 8 def self.() Yawast::Shared::Output.log_hash 'vulnerabilities', 'iis_version_exposed', {vulnerable: false, version: nil} # don't bother if this doesn't include IIS return unless .include? 'Microsoft-IIS/' @iis = true Yawast::Utilities.puts_warn "IIS Version: #{}" puts '' Yawast::Shared::Output.log_hash 'vulnerabilities', 'iis_version_exposed', {vulnerable: true, version: } end |
.check_header_value(head, search, message) ⇒ Object
40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 |
# File 'lib/scanner/plugins/servers/iis.rb', line 40 def self.check_header_value(head, search, ) head.each do |k, v| if k.downcase == search Yawast::Utilities.puts_warn "#{} Version: #{v}" puts '' Yawast::Shared::Output.log_hash 'vulnerabilities', "asp_net_#{search.tr('-', '_')}_version_exposed", {vulnerable: true, version: v} else Yawast::Shared::Output.log_hash 'vulnerabilities', "asp_net_#{search.tr('-', '_')}_version_exposed", {vulnerable: false, version: nil} end end end |
.check_mvc_version(head) ⇒ Object
36 37 38 |
# File 'lib/scanner/plugins/servers/iis.rb', line 36 def self.check_mvc_version(head) check_header_value head, 'x-aspnetmvc-version', 'ASP.NET MVC' end |