关联漏洞
标题:
Apache HTTP/2 资源管理错误漏洞
(CVE-2023-44487)
描述:HTTP/2是超文本传输协议的第二版,主要用于保证客户机与服务器之间的通信。 Apache HTTP/2存在安全漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品和版本受到影响:.NET 6.0,ASP.NET Core 6.0,.NET 7.0,Microsoft Visual Studio 2022 version 17.2,Microsoft Visual Studio 2022 version 17.4,Microsoft Visual Studio 2022 version 17.6,Micros
描述
Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concept
介绍
# CVE-2023-44487 (HTTP/2 Rapid Reset)
There are some examples in this repo which are not tested completely to analyse the impact, but I just wanted to perform the concept of this attack `(starting many streams and immediately sending RST_STREAM frame to avoid reaching MAX_CONCURRENT_STREAMS)`.
# H2SpaceX
I use [H2SpaceX](https://github.com/nxenon/h2spacex) low level HTTP/2 library which I created for exploiting Single Packet Attack
# Examples
- There are 2 examples:
- [Example 1](cve-2023-44487-example1.py)
- Sending 10000 GET requests and sending RESET STREAM frames after each request immediately
- [Example 2](cve-2023-44487-example2.py)
- Sending 100000 POST requests (with single packet attack technique) which causes server to wait for last byte, and then sending RESET STREAM frame after each request
- This Example also uses threading to open more H2 connections.
# Read & Do More
- Do More
- You can read more about using [H2SpaceX](https://github.com/nxenon/h2spacex) to send raw frames.
- [Quick Start Example for Single Packet Attack](https://github.com/nxenon/h2spacex/wiki/Quick-Start-Examples)
- [H2Frames](https://github.com/nxenon/h2spacex/blob/main/src/h2spacex/h2_frames.py)
- Read More
- [HTTP/2 Rapid Reset Attack by Cloudflare](https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/)
- [Lots of References at cve.org](https://www.cve.org/CVERecord?id=CVE-2023-44487)
文件快照
[4.0K] /data/pocs/2bde503d36efae321752ef4b2b2c776c1cd9da9e
├── [ 976] cve-2023-44487-example1.py
├── [1.6K] cve-2023-44487-example2.py
├── [ 35K] LICENSE
└── [1.4K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。