Add files via upload
parent
91f3f8b3bc
commit
5b9bd0571d
|
@ -2,7 +2,7 @@ id: CVE-2015-1635
|
||||||
info:
|
info:
|
||||||
name: HTTP.sys Remote Code Execution Vulnerability
|
name: HTTP.sys Remote Code Execution Vulnerability
|
||||||
author: Phillipo
|
author: Phillipo
|
||||||
severity: high
|
severity: critical
|
||||||
description: HTTP.sys in some versions of Microsoft Windows allows remote attackers to execute arbitrary code via crafted HTTP requests.
|
description: HTTP.sys in some versions of Microsoft Windows allows remote attackers to execute arbitrary code via crafted HTTP requests.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/36773
|
- https://www.exploit-db.com/exploits/36773
|
||||||
|
@ -14,22 +14,15 @@ info:
|
||||||
cve-id: CVE-2015-1635
|
cve-id: CVE-2015-1635
|
||||||
tags: cve,cve2015,kev,microsoft
|
tags: cve,cve2015,kev,microsoft
|
||||||
|
|
||||||
http:
|
requests:
|
||||||
- raw:
|
- method: GET
|
||||||
- |
|
path:
|
||||||
GET /welcome.png HTTP/1.1
|
- "{{BaseURL}}/"
|
||||||
Host: {{Hostname}}
|
headers:
|
||||||
Range: bytes=0-18446744073709551615
|
Range: "bytes=0-18446744073709551615"
|
||||||
- |
|
|
||||||
GET /robots.txt HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Range: bytes=0-18446744073709551615
|
|
||||||
|
|
||||||
matchers-condition: and
|
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "Requested Range Not Satisfiable"
|
- "416"
|
||||||
- type: status
|
- "The requested range is not satisfiable"
|
||||||
status:
|
|
||||||
- 416
|
|
Loading…
Reference in New Issue