libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/149978/Shell-In-A-Box-2.2.0-Denial-Of-Service.html | Exploit Patch Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Oct/50 | Exploit Mailing List Patch Third Party Advisory |
https://code.google.com/archive/p/shellinabox/issues | Third Party Advisory |
https://github.com/shellinabox/shellinabox/commit/4f0ecc31ac6f985e0dd3f5a52cbfc0e9251f6361 | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-03-21 16:00
Updated : 2024-02-28 17:08
NVD link : CVE-2018-16789
Mitre link : CVE-2018-16789
CVE.ORG link : CVE-2018-16789
JSON object : View
Products Affected
shellinabox_project
- shellinabox
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')