module
HTTPDX tolog() Function Format String Vulnerability
Disclosed | Created |
---|---|
Nov 17, 2009 | May 30, 2018 |
Disclosed
Nov 17, 2009
Created
May 30, 2018
Description
This module exploits a format string vulnerability in HTTPDX HTTP server.
By sending a specially crafted HTTP request containing format specifiers, an
attacker can corrupt memory and execute arbitrary code.
By default logging is off for HTTP, but enabled for the 'moderator' user
via FTP.
By sending a specially crafted HTTP request containing format specifiers, an
attacker can corrupt memory and execute arbitrary code.
By default logging is off for HTTP, but enabled for the 'moderator' user
via FTP.
Author
jduck jduck@metasploit.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.