libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
References
Link | Resource |
---|---|
https://github.com/shellinabox/shellinabox/commit/4f0ecc31ac6f985e0dd3f5a52cbfc0e9251f6361 | Patch Third Party Advisory |
https://code.google.com/archive/p/shellinabox/issues | Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Oct/50 | Exploit Mailing List Patch Third Party Advisory |
http://packetstormsecurity.com/files/149978/Shell-In-A-Box-2.2.0-Denial-Of-Service.html | Exploit Patch Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-03-21 09:00
Updated : 2020-08-24 10:37
NVD link : CVE-2018-16789
Mitre link : CVE-2018-16789
JSON object : View
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
Products Affected
shellinabox_project
- shellinabox