module

Apache Module mod_rewrite LDAP Protocol Buffer Overflow

Disclosed
2006-07-28
Created
2018-05-30

Description

This module exploits the mod_rewrite LDAP protocol scheme handling
flaw discovered by Mark Dowd, which produces an off-by-one overflow.
Apache versions 1.3.29-36, 2.0.47-58, and 2.2.1-2 are vulnerable.
This module requires REWRITEPATH to be set accurately. In addition,
the target must have 'RewriteEngine on' configured, with a specific
'RewriteRule' condition enabled to allow for exploitation.

The flaw affects multiple platforms, however this module currently
only supports Windows based installations.

Author

aushack patrick@osisecurity.com.au

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/http/apache_mod_rewrite_ldap
msf exploit(apache_mod_rewrite_ldap) > show targets
...targets...
msf exploit(apache_mod_rewrite_ldap) > set TARGET < target-id >
msf exploit(apache_mod_rewrite_ldap) > show options
...show and set options...
msf exploit(apache_mod_rewrite_ldap) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.