module

Node.js HTTP Pipelining Denial of Service

Disclosed
Oct 18, 2013
Created
May 30, 2018

Description

This module exploits a Denial of Service (DoS) condition in the HTTP parser of Node.js versions
released before 0.10.21 and 0.8.26. The attack sends many pipelined
HTTP requests on a single connection, which causes unbounded memory
allocation when the client does not read the responses.

Authors

Marek Majkowski
titanous
joev joev@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/dos/http/nodejs_pipelining
msf auxiliary(nodejs_pipelining) > show actions
...actions...
msf auxiliary(nodejs_pipelining) > set ACTION < action-name >
msf auxiliary(nodejs_pipelining) > show options
...show and set options...
msf auxiliary(nodejs_pipelining) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.