Closed theyush closed 7 years ago
Maybe you could post some console output or a screenshot?
It's probably not vulnerable.
152 print_error("#{ip}: File doesn't seem to exist. The upload probably failed")
I tried to change the path as well but still same result.
Just because the method is allowed doesn't necessarily mean it'll work.
That looks like Nikto. "Trust but verify" applies to vuln scanners, too. I'd test with your favorite webapp tool (this could even be plain curl
).
Judging by the Server
header, maybe you should try something else? https://www.mdsec.co.uk/2016/10/building-an-iot-botnet-bsides-manchester-2016/
Closing as likely a false positive detection, an action being reported as available by a server does not mean it this particular vector is not mitigated in some way.
I found OSVDB 397 in our project and when I try to use the exploit it is showing an error that file doesn't seem to exists when using PUT action.