![]() ![]() | http-litespeed-sourcecode-download.nse: /phpinfo. Nmap -p8088 -script http-litespeed-sourcecode-download Example Usage nmap -p80 -script http-litespeed-sourcecode-download -script-args http-litespeed-sourcecode-download.uri=/phpinfo.php ![]() Actions To Take Change your httpdconfig.xml file. Impact An attacker can see the files located in the directory and could potentially access files which disclose sensitive information. The web server responded with a list of files located in the target directory. See the documentation for the smbauth library. Invicti identified a Directory Listing (LiteSpeed). smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername See the documentation for the http library. http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, uncated-ok, eragent See the documentation for the slaxml library. Exploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.x before 4.0.15 to retrieve the target script's source code by sending a HTTP request with a null byte followed by a. Script Arguments http-litespeed-sourcecode-download.uri If index.php is notįound, you may try /phpinfo.php which is also shipped with LiteSpeed Web Leaf PHPMailer 2019 - wso shell - Litespeed Bypass Shell C99 shell r57. If the server is not vulnerable it returns an error 400. System Administration Web Development Cloud Hosting Services (Free kittens). Script Arguments Example Usage Script Output Script http-litespeed-sourcecode-downloadĮxploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.xīefore 4.0.15 to retrieve the target script's source code by sending a HTTP
0 Comments
Leave a Reply. |