Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.104039
Category:Nmap NSE net
Title:Nmap NSE net: http-userdir-enum
Summary:Attempts to enumerate valid usernames on web servers running with the mod_userdir module or similar;enabled.;;The Apache mod_userdir module allows user-specific directories to be accessed using the;http://example.com/~user/ syntax. This script makes http requests in order to discover valid user-;specific directories and infer valid usernames. By default, the script will use Nmap's;'nselib/data/usernames.lst'. An HTTP response status of 200 or 403 means the username is;likely a valid one and the username will be output in the script results along with the status code;(in parentheses).;;This script makes an attempt to avoid false positives by requesting a directory which is unlikely to;exist. If the server responds with 200 or 403 then the script will not continue testing it.;;SYNTAX:;;userdir.users: The filename of a username list.;;limit: The maximum number of users to check.;;http-max-cache-size: The maximum memory size (in bytes) of the cache.;;http.pipeline: If set, it represents the number of HTTP requests that'll be;pipelined (ie, sent in a single request). This can be set low to make;debugging easier, or it can be set high to test how a server reacts (its;chosen max is ignored).
Description:Summary:
Attempts to enumerate valid usernames on web servers running with the mod_userdir module or similar
enabled.

The Apache mod_userdir module allows user-specific directories to be accessed using the
http://example.com/~
user/ syntax. This script makes http requests in order to discover valid user-
specific directories and infer valid usernames. By default, the script will use Nmap's
'nselib/data/usernames.lst'. An HTTP response status of 200 or 403 means the username is
likely a valid one and the username will be output in the script results along with the status code
(in parentheses).

This script makes an attempt to avoid false positives by requesting a directory which is unlikely to
exist. If the server responds with 200 or 403 then the script will not continue testing it.

SYNTAX:

userdir.users: The filename of a username list.

limit: The maximum number of users to check.

http-max-cache-size: The maximum memory size (in bytes) of the cache.

http.pipeline: If set, it represents the number of HTTP requests that'll be
pipelined (ie, sent in a single request). This can be set low to make
debugging easier, or it can be set high to test how a server reacts (its
chosen max is ignored).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2001-1013
BugTraq ID: 3335
http://www.securityfocus.com/bid/3335
Bugtraq: 20010912 Is there user Anna at your host ? (Google Search)
http://www.securityfocus.com/archive/1/213667
http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0083.html
http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0087.html
http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0094.html
XForce ISS Database: linux-apache-username-exists(7129)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7129
CopyrightCopyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.