rsync-list-modules: Rsync List Modules - Enumeration

日期: 2025-08-01 | 影响软件: rsync | POC: 已公开

漏洞描述

Lists modules available for rsync (remote file sync) synchronization.

PoC代码[已公开]

id: rsync-list-modules

info:
  name: Rsync List Modules - Enumeration
  author: pussycat0x
  severity: low
  description: |
    Lists modules available for rsync (remote file sync) synchronization.
  reference:
    - https://nmap.org/nsedoc/scripts/rsync-list-modules.html
  metadata:
    verified: true
    max-request: 1
    shodan-query: port:873
  tags: network,rsync,enum,js,discovery

javascript:
  - pre-condition: |
      isPortOpen(Host,Port);
    code: |
      let m = require('nuclei/rsync');
      let response = m.IsRsync(Host,Port);
      if (response && response.IsRsync === true) {
        const bannerVersion = response.Banner;
        const c = require("nuclei/net");
        const data = "@RSYNCD: 31.0\n\n"
        const conn = c.Open('tcp', `${Host}:${Port}`);
        conn.Send(data);
        response = conn.RecvFullString(1024)
        const rsyncRegex = /@RSYNCD: EXIT|@RSYNCD: 31.0|@RSYNCD:|@RSYNCD: 30.0/g;
        const resultString = response.replace(rsyncRegex, "");
        const whitespaceRegex = /[\s\t\n]+/g;
        const finalResult = resultString.replace(whitespaceRegex, "  ");
        let cleanResult = finalResult;
        if (Array.isArray(cleanResult)) {
          cleanResult = cleanResult[0];
        }
        cleanResult = cleanResult
          .replace(new RegExp(`^${bannerVersion}\\s+`, 'g'), '')
          .replace(/^\d+\.\d+\s+/, '')
          .replace(/^\d+\s+/, '')
          .trim();
        if (cleanResult === "") {
          exit();
        }
        else {
          response = cleanResult;
        }
      } else {
        exit();
      }
      response

    args:
      Host: "{{Host}}"
      Port: 873

    matchers:
      - type: word
        negative: true
        words:
          - "HTTP/1.1"

    extractors:
      - type: dsl
        dsl:
          - response
# digest: 4a0a00473045022022dbd6c3e7ccb4608941534933675f51e25abcf6779b1edd06e367e1b6e7ea3a02210089d2ad9f18d1180dbc88ede475a5671224a4b8c0a64fa803b1bdc965f489c7fe:922c64590222798bb761d5b6d8e72950

相关漏洞推荐