Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2015-3183

Description

The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.

POC

Reference

- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html

- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html

- http://www.securityfocus.com/bid/91787

- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246

Github

- https://github.com/8ctorres/SIND-Practicas

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Samaritin/OSINT

- https://github.com/ameihm0912/nasltokens

- https://github.com/firatesatoglu/shodanSearch

- https://github.com/kasem545/vulnsearch

- https://github.com/lekctut/sdb-hw-13-01

- https://github.com/pedr0alencar/vlab-metasploitable2

- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough