modules/recon/localstart_asp.rb in arachni-0.4.6 vs modules/recon/localstart_asp.rb in arachni-0.4.7

- old
+ new

@@ -16,11 +16,11 @@ # localstart.asp recon module. # # @author Tasos "Zapotek" Laskos <tasos.laskos@gmail.com> # -# @version 0.1.1 +# @version 0.1.2 class Arachni::Modules::LocalstartASP < Arachni::Module::Base def run return if page.platforms.languages.any? && !page.platforms.languages.include?( :asp ) @@ -50,17 +50,47 @@ { name: 'localstart.asp', description: %q{Checks for localstart.asp.}, elements: [ Element::SERVER ], author: 'Tasos "Zapotek" Laskos <tasos.laskos@gmail.com>', - version: '0.1.1', + version: '0.1.2', targets: %w(Generic), issue: { name: %q{Exposed localstart.asp page}, - description: %q{The default management ISS page localstart.asp - is still on the server.}, + description: %q{To restrict access to specific pages on a + webserver, developers can implement various methods of + authentication, therefore only allowing access to clients + with valid credentials. There are several forms of + authentication that can be used. The simplest forms of + authentication are known as 'Basic' and 'Basic Realm'. + These methods of authentication have several known + weaknesses such as being susceptible to brute force attacks. + Additionally, when utilising the NTLM mechanism in a windows + environment, several disclosures of information exist, and + any brute force attack occurs against the server's local + users, or domain users if the web server is a domain + member. Cyber-criminals will attempt to locate protected + pages to gain access to them and also perform brute force + attacks to discover valid credentials. Arachni discovered + the following page requires NTLM based basic authentication + in order to be accessed.}, tags: %w(asp iis server), - severity: Severity::LOW + severity: Severity::LOW, + remedy_guidance: %q{If the pages being protected are not + required for the functionality of the web application they + should be removed, otherwise, it is recommended that basic + and basic realm authentication are not used to protect + against pages requiring authentication. If NTLM based basic + authentication must be used, then default server and domain + accounts such as 'administrator' and 'root' should be disabled, + as these will undoubtedly be the first accounts to be + targeted in any such attack. Additionally, the webserver + should not be joined to any corporate domain where usernames + are readily available (such as from email addresses). If the + pages are required, and it is possible to remove the basic + authentication, then a stronger and more resilient form-based + authentication mechanism should be implemented to protect the + affected pages.} } } end end