HEX
Server: Apache/2.4.52 (Ubuntu)
System: Linux ip-172-31-4-197 6.8.0-1036-aws #38~22.04.1-Ubuntu SMP Fri Aug 22 15:44:33 UTC 2025 x86_64
User: ubuntu (1000)
PHP: 7.4.33
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Upload Files
File: //usr/share/nmap/scripts/http-frontpage-login.nse
local stdnse = require "stdnse"
local shortport = require "shortport"
local http = require "http"
local string = require "string"
local vulns = require "vulns"


description = [[
Checks whether target machines are vulnerable to anonymous Frontpage login.

Older, default configurations of Frontpage extensions allow
remote user to login anonymously which may lead to server compromise.

 ]]

---
-- @usage
-- nmap <target> -p 80 --script=http-frontpage-login
--
-- @args http-frontpage-login.path Path prefix to Frontpage directories. Defaults
-- to root ("/").
--
-- @output
-- PORT   STATE SERVICE REASON
-- 80/tcp open  http    syn-ack
-- | http-frontpage-login:
-- |   VULNERABLE:
-- |   Frontpage extension anonymous login
-- |     State: VULNERABLE
-- |     Description:
-- |       Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
-- |
-- |     References:
-- |_      http://insecure.org/sploits/Microsoft.frontpage.insecurities.html

author = "Aleksandar Nikolic"

license = "Same as Nmap--See https://nmap.org/book/man-legal.html"

categories = {"vuln", "safe"}

portrule = shortport.http

action = function(host, port)
  local path = stdnse.get_script_args('http-frontpage-login.path') or "/"
  local data
  local frontpage_vuln = {
    title = "Frontpage extension anonymous login",

    description = [[
Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
]],
    references = {
      'http://insecure.org/sploits/Microsoft.frontpage.insecurities.html',
    },
    state = vulns.STATE.NOT_VULN,
  };

  local report = vulns.Report:new(SCRIPT_NAME, host, port);

  data = http.get( host, port, path .. "/_vti_inf.html" )

  if data and data.status and data.status == 200 then
    --server does support frontpage extensions
    local fp_version = string.match(data.body,"FPVersion=\"[%d%.]*\"")
    if fp_version then
      -- do post request http://msdn.microsoft.com/en-us/library/ms446353
      local postdata = "method=open+service:".. fp_version .."&service_name=/"
      data = http.post(host,port,path .. "/_vti_bin/_vti_aut/author.dll",nil,nil,postdata)
      if data and data.status then
        if data.status == 200  then
          stdnse.debug1("Frontpage returned 200 OK, server vulnerable.")
          frontpage_vuln.state = vulns.STATE.VULN;
        elseif data.status == 401  then
          stdnse.debug1("Frontpage returned 401, password protected.")
        else
          stdnse.debug1("Frontpage returned unknown response.")
        end
      end
    end
  end
  stdnse.debug1("Frontpage probably not installed.")
  return report:make_output(frontpage_vuln);
end