Rapid7 Vulnerability & Exploit Database

Intersil (Boa) HTTPd Basic Authentication Password Reset

Back to Search

Intersil (Boa) HTTPd Basic Authentication Password Reset

Disclosed
09/10/2007
Created
05/30/2018

Description

The Intersil extension in the Boa HTTP Server 0.93.x - 0.94.11 allows basic authentication bypass when the user string is greater than 127 bytes long. The long string causes the password to be overwritten in memory, which enables the attacker to reset the password. In addition, the malicious attempt also may cause a denial-of-service condition. Please note that you must set the request URI to the directory that requires basic authentication in order to work properly.

Author(s)

  • Luca "ikki" Carettoni <luca.carettoni@securenetwork.it>
  • Claudio "paper" Merloni <claudio.merloni@securenetwork.it>
  • Max Dietz <maxwell.r.dietz@gmail.com>

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/intersil_pass_reset
msf auxiliary(intersil_pass_reset) > show actions
    ...actions...
msf auxiliary(intersil_pass_reset) > set ACTION < action-name >
msf auxiliary(intersil_pass_reset) > show options
    ...show and set options...
msf auxiliary(intersil_pass_reset) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;