class Yawast::Scanner::Plugins::Servers::Iis
Public Class Methods
check_all(uri, head)
click to toggle source
# File lib/scanner/plugins/servers/iis.rb, line 25 def self.check_all(uri, head) # run all the defined checks check_asp_banner(head) check_mvc_version(head) check_asp_net_debug(uri) end
check_asp_net_debug(uri)
click to toggle source
# File lib/scanner/plugins/servers/iis.rb, line 57 def self.check_asp_net_debug(uri) begin req = Yawast::Shared::Http.get_http(uri) req.use_ssl = uri.scheme == 'https' headers = Yawast::Shared::Http.get_headers headers['Command'] = 'stop-debug' headers['Accept'] = '*/*' res = req.request(Debug.new('/', headers)) if res.code == 200 Yawast::Utilities.puts_vuln 'ASP.NET Debugging Enabled' Yawast::Shared::Output.log_hash 'vulnerabilities', 'asp_net_debug_enabled', {vulnerable: true, body: res.body, code: res.code} else Yawast::Shared::Output.log_hash 'vulnerabilities', 'asp_net_debug_enabled', {vulnerable: false, body: res.body, code: res.code} end end end
check_header_value(head, search, message)
click to toggle source
# File lib/scanner/plugins/servers/iis.rb, line 40 def self.check_header_value(head, search, message) head.each do |k, v| if k.downcase == search Yawast::Utilities.puts_warn "#{message} Version: #{v}" puts '' Yawast::Shared::Output.log_hash 'vulnerabilities', "asp_net_#{search.tr('-', '_')}_version_exposed", {vulnerable: true, version: v} else Yawast::Shared::Output.log_hash 'vulnerabilities', "asp_net_#{search.tr('-', '_')}_version_exposed", {vulnerable: false, version: nil} end end end
check_mvc_version(head)
click to toggle source
# File lib/scanner/plugins/servers/iis.rb, line 36 def self.check_mvc_version(head) check_header_value head, 'x-aspnetmvc-version', 'ASP.NET MVC' end