Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 23.216.137.229, 2600:141b:1c00:395::2db1, 2600:141b:1c00:3a0::2db1, 2600:141b:1c00:392::2db1, 2600:141b:1c00:3a2::2db1, 2600:141b:1c00:383::2db1 + Target IP: 23.216.137.229 + Target Hostname: www.att.com + Target Port: 80 + Start Time: 2024-08-01 14:51:47 (GMT-4) --------------------------------------------------------------------------- + Server: AkamaiGHost + /: Cookie DTAB created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Cookie att-appshell-path created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Uncommon header 'aka-global-request-id-uxtime' found, with contents: 0.b859c817.1722538307.101f1eed. + /: Uncommon header 'att-application-group' found, with contents: uf-marketing. + /: Uncommon header 'server-timing' found, with multiple values: (cdn-cache; desc=HIT,edge; dur=1,ak_p; desc="1722538307677_399006136_270474989_18_76367_1_0_-";dur=1,). + /: Uncommon header 'att-appshell-path' found, with contents: /marketing/. + /1I9C5Htv.0: Cookie _abck created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /1I9C5Htv.0: Cookie bm_sz created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /scripts/cart32.exe: request cart32.exe/cart32clientlist. + /scripts/classified.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/download.cgi: Check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/flexform.cgi: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /scripts/flexform: Check Phrack 55 for info by RFP; allows to append info to writable files. See: http://phrack.org/issues/55/7.html#article + /scripts/lwgate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/LWGate.cgi: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/lwgate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/LWGate: Check Phrack 55 for info by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/perlshop.cgi: v3.1 by ARPAnet.com; check info in Phrack 55 by RFP. See: http://phrack.org/issues/55/7.html#article + /scripts/samples/details.idc: NT ODBC Remote Compromise. See: http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc + /scripts/handler.cgi: Variation of Irix Handler? Has been seen from other CGI scanners. + /scripts/finger: finger other users, may be other commands?. + /scripts/finger.pl: finger other users, may be other commands?. + /scripts/get32.exe: This can allow attackers to execute arbitrary commands remotely. + /scripts/gm-authors.cgi: GreyMatter 'password' file, that controls who can post. This contains login and password information and is installed mode 666 by default. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /scripts/guestbook/passwd: GuestBook r4 from lasource.r2.ru stores the admin password in a plain text file. + /scripts/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /scripts/wrap.cgi: Allows viewing of directories. + /help/: Help directory should not be accessible. + /scripts/visadmin.exe: This CGI allows an attacker to crash the web server. Remove it from the CGI directory. + /scripts/html2chtml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /scripts/html2wml.cgi: Html2Wml < 0.4.8 access local files via CGI, and more. + /scripts/echo.bat?&dir+c:\\: This batch file may allow attackers to execute remote commands. + /scripts/guestbook.cgi: May allow attackers to execute commands as the web daemon. + /scripts/guestbook.pl: May allow attackers to execute commands as the web daemon. + /scripts/ss: Mediahouse Statistics Server may allow attackers to execute remote commands. Upgrade to the latest version or remove from the CGI directory. + /scripts/gH.cgi: Web backdoor by gH. + /scripts/gm-cplog.cgi: GreyMatter log file defaults to mode 666 and contains login and passwords used to update the GM site. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /scripts/gm.cgi: GreyMatter blogger may reveal user IDs/passwords through a gmrightclick-######.reg files (# are numbers), possibly in /archive or other archive location. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0324 http://www.attrition.org/~jericho/works/security/greymatter.html + /scripts/AT-admin.cgi: Admin interface. + /scripts/auth_data/auth_user_file.txt: The DCShop installation allows credit card numbers to be viewed remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0821 https://packetstormsecurity.com/files/32406/xmas.txt.html + /scripts/mt-static/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /scripts/mt/mt-check.cgi: Movable Type weblog diagnostic script found. Reveals docroot path, operating system, Perl version, and modules. + /scripts/banner.cgi: This CGI may allow attackers to read any file on the system. + /scripts/bannereditor.cgi: This CGI may allow attackers to read any file on the system. + /scripts/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /scripts/bizdb1-search.cgi: This CGI may allow attackers to execute commands remotely. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287 + /scripts/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /scripts/blog/mt-load.cgi: Movable Type weblog installation CGI found. May be able to reconfigure or reload. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dir>. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/MS02-028 + /scripts/iisadmin/ism.dll: Allows you to mount a brute force attack on passwords. + /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more. + /scripts/moin.cgi?test: MoinMoin 1.1 and prior contain at least two XSS vulnerabilities. Version 1.0 and prior also contains a XSLT related vulnerability. See: http://moinmo.in/MoinMoinDownload + /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0614 + /scripts/tools/dsnform.exe: Allows creation of ODBC Data Source. + /scripts/tools/dsnform: Allows creation of ODBC Data Source. + /scripts/httpodbc.dll: Possible IIS backdoor found. + /scripts/proxy/w3proxy.dll: MSProxy v1.0 installed. + /scripts/astrocam.cgi: Astrocam 1.4.1 contained buffer overflow. Prior to 2.1.3 contained unspecified security bugs. See: http://www.securityfocus.com/bid/4684 + /scripts/badmin.cgi: BannerWheel v1.0 is vulnerable to a local buffer overflow. If this is version 1.0 it should be upgraded. + Scan terminated: 0 error(s) and 59 item(s) reported on remote host + End Time: 2024-08-01 14:52:48 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested