Files
nuclei-templates/code/windows/audit/windows-script-host-enabled.yaml
2024-12-01 12:00:57 +00:00

34 lines
1.1 KiB
YAML

id: windows-script-host-enabled
info:
name: Windows Script Host Enabled
author: princechaddha
severity: medium
description: Checks if Windows Script Host is enabled, which can be used to run malicious scripts.
impact: |
Leaving Windows Script Host enabled may allow attackers to execute harmful scripts on the system.
remediation: |
Disable Windows Script Host by setting the Enabled registry key to 0.
tags: windows,code,windows-audit
self-contained: true
code:
- pre-condition: |
IsWindows();
engine:
- powershell
- powershell.exe
args:
- -ExecutionPolicy
- Bypass
pattern: "*.ps1"
source: |
$(Get-ItemProperty -Path 'HKLM:\Software\Microsoft\Windows Script Host\Settings' -Name 'Enabled' -ErrorAction SilentlyContinue).Enabled -eq 0
matchers:
- type: word
words:
- "True"
# digest: 4a0a0047304502202d771439975cf9a66a0353b712c2f81125b1c35af35a9d4b2699ad5249a8bcbc0221009308b82cd5af91f14dafaaecedb53688766fa18a32ee15590eec8dc2303ff46b:922c64590222798bb761d5b6d8e72950