mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-24 03:24:01 +02:00
20 lines
1.0 KiB
Markdown
20 lines
1.0 KiB
Markdown
### [CVE-2012-10058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10058)
|
||

|
||

|
||

|
||
|
||
### Description
|
||
|
||
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
|
||
|
||
### POC
|
||
|
||
#### Reference
|
||
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb
|
||
- https://www.exploit-db.com/exploits/18929
|
||
- https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow
|
||
|
||
#### Github
|
||
No PoCs found on GitHub currently.
|
||
|