Delete javascript/network/smb/CVE-2020-0796.yaml
parent
770a6d903f
commit
af5703765f
|
@ -1,31 +0,0 @@
|
||||||
id: CVE-2020-0796
|
|
||||||
|
|
||||||
info:
|
|
||||||
name: SMBGhost Vulnerability
|
|
||||||
author: pussycat0x
|
|
||||||
severity: unknown
|
|
||||||
description: |
|
|
||||||
SMBGhost, or CVE-2020-0796, is a vulnerability that resides within the Microsoft Server Message Block 3.0 (SMBv3), a protocol introduced by the company to its newer operating systems. This communication protocol enables shared access to files, data, and other assets within an interconnected computer network.
|
|
||||||
reference:
|
|
||||||
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0796
|
|
||||||
metadata:
|
|
||||||
verified: true
|
|
||||||
shodan-query: "port:445"
|
|
||||||
tags: js,network,smb,enum
|
|
||||||
|
|
||||||
javascript:
|
|
||||||
- code: |
|
|
||||||
var m = require("nuclei/smb");
|
|
||||||
var c = m.SMBClient();
|
|
||||||
var response = c.DetectSMBGhost(Host, Port);
|
|
||||||
log(to_json(response));
|
|
||||||
|
|
||||||
args:
|
|
||||||
Host: "{{Host}}"
|
|
||||||
Port: "445"
|
|
||||||
|
|
||||||
matchers:
|
|
||||||
- type: word
|
|
||||||
words:
|
|
||||||
- "response == test"
|
|
||||||
- "success == true"
|
|
Loading…
Reference in New Issue