One Hat Cyber Team
Your IP :
10.30.1.1
Server IP :
103.148.201.5
Server :
Linux web-olt 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Server Software :
Apache/2.4.52 (Ubuntu)
PHP Version :
8.1.29
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
proc
/
6955
/
root
/
usr
/
share
/
nmap
/
scripts
/
View File Name :
http-vuln-cve2014-2126.nse
local anyconnect = require('anyconnect') local shortport = require('shortport') local vulns = require('vulns') local sslcert = require('sslcert') local stdnse = require "stdnse" description = [[ Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126). ]] --- -- @see http-vuln-cve2014-2127.nse -- @see http-vuln-cve2014-2128.nse -- @see http-vuln-cve2014-2129.nse -- -- @usage -- nmap -p 443 --script http-vuln-cve2014-2126 <target> -- -- @output -- PORT STATE SERVICE -- 443/tcp open https -- | http-vuln-cve2014-2126: -- | VULNERABLE: -- | Cisco ASA ASDM Privilege Escalation Vulnerability -- | State: VULNERABLE -- | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C) -- | Description: -- | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. -- | -- | References: -- | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa -- |_ http://cvedetails.com/cve/2014-2126/ author = "Patrik Karlsson <patrik@cqure.net>" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = {"vuln", "safe"} portrule = function(host, port) return shortport.ssl(host, port) or sslcert.isPortSupported(port) end action = function(host, port) local vuln_table = { title = "Cisco ASA ASDM Privilege Escalation Vulnerability", state = vulns.STATE.NOT_VULN, risk_factor = "High", scores = { CVSSv2 = "8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C)", }, description = [[ Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. ]], references = { 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa', 'http://cvedetails.com/cve/2014-2126/' } } local vuln_versions = { ['8'] = { ['2'] = 5.47, ['4'] = 7.5, ['7'] = 1.11, }, ['9'] = { ['0'] = 3.10, ['1'] = 3.4, }, } local report = vulns.Report:new(SCRIPT_NAME, host, port) local ac = anyconnect.Cisco.AnyConnect:new(host, port) local status, err = ac:connect() if not status then return stdnse.format_output(false, err) else local ver = ac:get_version() if vuln_versions[ver['major']] and vuln_versions[ver['major']][ver['minor']] then if vuln_versions[ver['major']][ver['minor']] > tonumber(ver['rev']) then vuln_table.state = vulns.STATE.VULN end end end return report:make_output(vuln_table) end