mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 19:20:58 +00:00
27 lines
1.3 KiB
Markdown
27 lines
1.3 KiB
Markdown
![]() |
### [CVE-2018-11763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/PawanKumarPandit/Shodan-nrich
|
||
|
- https://github.com/RoseSecurity-Research/Red-Teaming-TTPs
|
||
|
- https://github.com/RoseSecurity/Red-Teaming-TTPs
|
||
|
- https://github.com/Xorlent/Red-Teaming-TTPs
|
||
|
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
|
||
|
- https://github.com/bioly230/THM_Skynet
|
||
|
- https://github.com/retr0-13/nrich
|
||
|
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
|
||
|
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
|
||
|
- https://github.com/vshaliii/Funbox2-rookie
|
||
|
|