0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Shell In A Box 2.2.0 Denial Of Service Exploit
Author
Risk
[
Security Risk Medium
]0day-ID
Category
Date add
CVE
Platform
Product: Shell In A Box (aka shellinabox, shellinaboxd) "Shell In A Box implements a web server that can export arbitrary command line tools to a web based terminal emulator. This emulator is accessible to any JavaScript and CSS enabled web browser and does not require any additional browser plugins. " Most official-ish site: https://github.com/shellinabox/shellinabox Vulnerability description: The multipart/form-data parser function in the built-in webserver of Shell In A Box enters an infinite loop in case of malformed request payload, the server stops serving new requests and the the process eats up 100% of CPU time. Exploitation: curl -v --header "Content-type: multipart/form-data; boundary=------------------------8d14c0216fd84557" -d "impeachment" http://127.0.0.1:4200/s/ Affected Shell In A Box versions: 2.20 and below Remediation: Upgrade to 2.21 Package available in Debian sid: https://packages.debian.org/source/sid/shellinabox Patch: https://github.com/shellinabox/shellinabox/pull/446 # 0day.today [2024-12-26] #