通过数据库查询MVM的扫描漏洞名称和对应的扫描脚本关系

编程入门 行业动态 更新时间:2024-10-24 10:16:35

通过数据库查询MVM的扫描漏洞名称和对应的扫描<a href=https://www.elefans.com/category/jswz/34/1771291.html style=脚本关系"/>

通过数据库查询MVM的扫描漏洞名称和对应的扫描脚本关系

数据库和扫描脚本是漏洞扫描较为核心的两个部分,在日常运维中,官方的扫描脚本难免存在漏报误报的情况,想要深入了解和学习扫描的原理和验证漏洞,读对应漏洞的扫描脚本源代码是必不可少的。


下面的SQL语句,实现通过数据库查询MVM的扫描漏洞名称和对应的扫描脚本关系。



/****** Script for SelectTopNRows command from SSMS  ******/
--ScriptVuln 表是FaultlineID和scriptID的对应关系表,但似乎是一一对应关系,所以略去。 
SELECT [FaultlineID]--,[faultline].[Content].[Vuln].[ModuleID]--,[NID],[CVE],[MSFTID],[MSKBID],[CheckVersion]--,[CustomID]--,[Type],[Name],[Description],[Observation],[Risk],[Recommendation],[Simplicity],[Popularity],[Impact],[Intrusive],[SANS]--,[IAVA]--,[IAVARefNumber]--,[IAVAArmyRefNumber],[CheckRequiresCredentials],[AddedDate],[faultline].[Content].[Vuln].[ModifiedDate]--,[DeletedDate],[Status]--,[Customized]--,[Version]--,[Patched]--,[SupersededID],faultline.content.script.[ScriptName]--,faultline.content.script.[ModuleID]--,faultline.content.script.[ScriptRole]--,faultline.content.script.[CreatedDate],faultline.content.script.[ModifiedDate]--,faultline.content.script.[Script]FROM [faultline].[Content].[Vuln]left join faultline.content.script on faultline.content.script.scriptID=FaultlineID


如图是查询结果中的几个字段,关键是找到ScriptName,去读取源码。

FaultlineIDCVEMSFTIDScriptNameNameDescriptionObservation
1CVE-1999-1011MS99-025web-iis-rds-v2.fasl3(MS99-025) Microsoft IIS RDS Command ExecutionA command execution vulnerability in Microsoft IIS MDAC package allows  remote attackers to gain administrative control of targeted systems.Microsoft Internet Information Server (IIS) is an industry standard HTTP  server.  MDAC (Microsoft Data Access  Components) is a package used to integrate web and database services. It  includes a component named RDS (Remote Data Services). RDS allows remote  access via the internet to database objects through IIS.  Both are included in a default installation  of the Windows NT 4.0 Option Pack, but can be excluded via a custom installation.    RDS includes a component called the  DataFactory object, which has a vulnerability that could allow any web user  to (a) Obtain unauthorized access to unpublished files on the IIS server and  (b) Use MDAC to tunnel ODBC requests through to a remote internal or external  location, thereby obtaining access to non public servers or effectively  masking the source of an attack on another network.    If the Microsoft JET OLE DB Provider or  Microsoft DataShape Provider are installed, a user could use the shell() VBA  command on the server with System privileges. These two vulnerabilities  combined can allow an attacker on the Internet to run arbitrary commands with  System level privileges on the target host.     Vulnerable Systems:    Microsoft  IIS 4.0    For more information  see:    Microsoft Security Bulletin  MS99-025:   .mspx
2CVE-MAP-NOMATCHNULLunix-rpc-cmsd-v2.fasl3RPC Calendar Service cmsd AvailableThe RPC cmsd program was determined to be registered with the target  system's portmapper.The RPC cmsd program was determined to be registered with the target  system's portmapper. RPC services are commonly enabled by default on most  UNIX operating systems. Additionally, RPC services are regularly found to be  vulnerable to buffer overflow and format string attacks that lead to complete  compromise of the target system. Exploitation of RPC services affects all  major UNIX operating systems including Solaris, HP/UX, AIX, Irix, Linux,  FreeBSD and more.    For more  information see:    CVE-1999-0320  CVE-1999-0696  
39CVE-1999-0833, CVE-1999-0851NULLunix-bind-nxt-overflow-v2.fasl3ISC BIND NXT Buffer OverflowA buffer overflow vulnerability exists within BIND 8.2 NXT record  processing that allows an attacker to execute arbitrary code on vulnerable  systems.The portion of code responsible for processing NXT records in BIND 8.2  and 8.2.1 is vulnerable to a buffer overflow attack. By sending specially  crafted NXT record traffic to a vulnerable system it is possible to execute  arbitrary code on the target system.     Vulnerable Systems:  ISC BIND  8.2 - 8.2.1 on UNIX    For more  information see:     BID 788: 



脚本的内容也是存储在数据库中的,而且是经过加密的,内容不能直接可读,要查看脚本内容也只能通过MVM自己的编辑器,直接用文本编辑器打开是不可读的。和Nmap、Openvas的开源脚本不同。不过能都已经是不错了。


另外,MVM的更新原理是也通过数据库实现,即更新包实际上是更新数据库的内容,其他组件再通过与数据库的通信实现各自的更新。数据库成了核心。

转载于:

更多推荐

通过数据库查询MVM的扫描漏洞名称和对应的扫描脚本关系

本文发布于:2024-02-27 06:40:55,感谢您对本站的认可!
本文链接:https://www.elefans.com/category/jswz/34/1705553.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:脚本   漏洞   名称   关系   数据库

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!