vendor:
OrzHTTPd
by:
Patroklos Argyroudis
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: OrzHTTPd
Affected Version From: 1.0.0
Affected Version To: 1.0.2
Patch Exists: YES
Related CWE: CVE-2009-4140
CPE: a:orzhttpd:orzhttpd:1.0.2
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=49271, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/open_flash_chart_upload_exec, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/openemr_upload_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=43128
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
Orzex.py Format String Exploit
Orzex.py is a python script that exploits a format string vulnerability in the OrzHTTPd web server. The vulnerability is caused by improper handling of user-supplied input in the GET request. The exploit sends a specially crafted payload containing a format string to the vulnerable server, which can be used to overwrite the return address of the function and execute arbitrary code. The exploit also sends a trigger request to the server to execute the malicious code.
Mitigation:
Upgrade to the latest version of OrzHTTPd or apply the patch provided by the vendor.