POC详情: d7cb80d300cd2aa5cd1421150ce200852d95ecef

来源
关联漏洞
标题: Microsoft Internet Information Services 信息泄露漏洞 (CVE-2000-0649)
描述:Microsoft Internet Information Services(IIS)是美国微软(Microsoft)公司的一款适用于Windows Server平台的Web服务器。 Microsoft Internet Information Services 4.0版本存在信息泄露漏洞。远程攻击者可以借助被基本认证保护并且无区域定义的网页的HTTP 1.0请求来获得服务器的内部IP地址。
描述
Test for CVE-2000-0649, and return an IP address if vulnerable
介绍
# CVE-2000-0649
CVE-2000-0649 is a low risk vulnerability that can potentially disclose the internal IP addresses of the server. Official details are here:

* [Rapid7](https://www.rapid7.com/db/modules/auxiliary/scanner/http/iis_internal_ip/)
* [CVE](https://www.cvedetails.com/cve/CVE-2000-0649/)
* [NIST](https://nvd.nist.gov/vuln/detail/CVE-2000-0649)

This particular vulnerability became of interest to me because it seems to affect current NGINX and some Apache setups as well. This tool tests for the vulnerability on a given IP or domain, and is deliberately light on the output so that it can be used with other scripts. When it works, it should look something like this:

![Image of cve-2000-0649 being run in a terminal](poc-working.jpg)

Otherwise, there will be no output. We fixed this in NGINX by adding the following line to `/etc/nginx/nginx.conf`:

```bash
server_name_in_redirect on
```

Thanks!
文件快照

[4.0K] /data/pocs/d7cb80d300cd2aa5cd1421150ce200852d95ecef ├── [1.3K] cve-2000-0649.py ├── [ 11K] poc-working.jpg └── [ 914] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。