Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2018-1301

Description

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

POC

Reference

No PoCs from references.

Github

- https://github.com/8ctorres/SIND-Practicas

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CAF-Extended/external_honggfuzz

- https://github.com/Corvus-AOSP/android_external_honggfuzz

- https://github.com/ForkLineageOS/external_honggfuzz

- https://github.com/HavocR/external_honggfuzz

- https://github.com/NeoOniX/5ATTACK

- https://github.com/Ozone-OS/external_honggfuzz

- https://github.com/ProtonAOSP-platina/android_external_honggfuzz

- https://github.com/ProtonAOSP/android_external_honggfuzz

- https://github.com/Samaritin/OSINT

- https://github.com/StatiXOS/android_external_honggfuzz

- https://github.com/TheXPerienceProject/android_external_honggfuzz

- https://github.com/TinkerBoard-Android/external-honggfuzz

- https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz

- https://github.com/TinkerBoard2-Android/external-honggfuzz

- https://github.com/Tomoms/android_external_honggfuzz

- https://github.com/Wave-Project/external_honggfuzz

- https://github.com/aosp10-public/external_honggfuzz

- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network

- https://github.com/bananadroid/android_external_honggfuzz

- https://github.com/bioly230/THM_Skynet

- https://github.com/crdroid-r/external_honggfuzz

- https://github.com/crdroidandroid/android_external_honggfuzz

- https://github.com/ep-infosec/50_google_honggfuzz

- https://github.com/firatesatoglu/shodanSearch

- https://github.com/google/honggfuzz

- https://github.com/imbaya2466/honggfuzz_READ

- https://github.com/jingpad-bsp/android_external_honggfuzz

- https://github.com/kasem545/vulnsearch

- https://github.com/lekctut/sdb-hw-13-01

- https://github.com/lllnx/lllnx

- https://github.com/pedr0alencar/vlab-metasploitable2

- https://github.com/r-mirror/android_external_honggfuzz

- https://github.com/random-aosp-stuff/android_external_honggfuzz

- https://github.com/uiop7774/Honggfuzz_mod

- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough

- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough

- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough

- https://github.com/vshaliii/Funbox2-rookie

- https://github.com/yaap/external_honggfuzz