POC详情: 6929d5f7079abed411c80bec28a6fbe73b070df8

来源
关联漏洞
标题: Wowza Media Systems Wowza Streaming Engine 资源管理错误漏洞 (CVE-2021-35492)
描述:Wowza Media Systems Wowza Streaming Engine是美国Wowza Media Systems公司的一个强大的、可定制的和可扩展的媒体服务器软件。用于将高质量视频和音频可靠地流式传输到任何地方的任何设备。 Wowza Media Systems Wowza Streaming Engine 4.8.11+5 版本及之前版本存在安全漏洞,攻击者可利用该漏洞造成数据库错误,并使设备对基于web的管理失去响应。
描述
Denial of Service tool for Wowza Streaming Engine <= 4.8.11+5 - Uncontrolled Resource Consumption (CVE-2021-35492)
介绍
## Exploit Information

**Exploit Title:** Wowza Streaming Engine 4.8.11+5 - Denial of Service  
**CVE:** [CVE-2021-35492](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35492)  
**Date:** 2021-10-06  
**Exploit Author:** N4nj0  
**Software Link:** [https://www.wowza.com/products/streaming-engine](https://www.wowza.com/products/streaming-engine)  
**Version:** 4.8.11+5  
**Tested on:** Wowza Streaming Engine <= 4.8.11+5  
**Vulnerability Advisory:** [https://n4nj0.github.io/advisories/wowza-streaming-engine-i/](https://n4nj0.github.io/advisories/wowza-streaming-engine-i/)  

TWowza Streaming Engine (known as Wowza Media Server) is a unified streaming media server software developed by Wowza Media Systems based in Colorado, in the United States of America and used by many US government entities such as NASA, US Air force, Boeing, New York Police Department and many other clients around the world.  
I've found a uncontrolled resource consumption which enables a remote attacker to exhaust filesystem resources via the */enginemanager/server/vhost/historical.jsdata* `vhost` parameter. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management.

### Usage
`./dos-exploit-wse.py -u http://wse.local:8088 -s CDA32846E8763F62293AAE42FA72C86B`  
`./dos-exploit-wse.py --url http://wse.local:8088 --session CDA32846E8763F62293AAE42FA72C86B`  
文件快照

[4.0K] /data/pocs/6929d5f7079abed411c80bec28a6fbe73b070df8 ├── [3.6K] dos-exploit-wse.py ├── [1.0K] LICENSE.md └── [1.4K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。