支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2023-44487 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
HTTP/2协议允许通过快速重置多个流来发起拒绝服务攻击,从而消耗服务器资源。

## 影响版本
未指定具体版本,但漏洞在2023年8月至10月期间在野外被利用。

## 细节
攻击者可以利用HTTP/2协议中的请求取消功能快速重置多个流,从而导致服务器资源过度消耗。

## 影响
服务器资源消耗,可能导致服务不可用。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞存在于Web服务的服务端,因为它涉及到HTTP/2协议的实现,攻击者可以通过快速重置多个流来消耗服务器资源,从而导致服务拒绝(DoS)。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache HTTP/2 资源管理错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
HTTP/2是超文本传输协议的第二版,主要用于保证客户机与服务器之间的通信。 Apache HTTP/2存在安全漏洞。攻击者利用该漏洞导致系统拒绝服务。以下产品和版本受到影响:.NET 6.0,ASP.NET Core 6.0,.NET 7.0,Microsoft Visual Studio 2022 version 17.2,Microsoft Visual Studio 2022 version 17.4,Microsoft Visual Studio 2022 version 17.6,Micros
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
资源管理错误
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-44487 的公开POC
#POC 描述源链接神龙链接
1Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487https://github.com/bcdannyboy/CVE-2023-44487POC详情
2Proof of concept for DoS exploit https://github.com/imabee101/CVE-2023-44487POC详情
3Test Script for CVE-2023-44487https://github.com/ByteHackr/CVE-2023-44487POC详情
4CVE-2023-44487https://github.com/pabloec20/rapidresetPOC详情
5Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)https://github.com/secengjeff/rapidresetclientPOC详情
6A python based exploit to test out rapid reset attack (CVE-2023-44487)https://github.com/studiogangster/CVE-2023-44487POC详情
7Nonehttps://github.com/ReToCode/golang-CVE-2023-44487POC详情
8HTTP/2 RAPID RESET https://github.com/sigridou/CVE-2023-44487POC详情
9Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses.https://github.com/ndrscodes/http2-rst-stream-attackerPOC详情
10Examples for Implementing cve-2023-44487 ( HTTP/2 Rapid Reset Attack ) Concepthttps://github.com/nxenon/cve-2023-44487POC详情
11A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).https://github.com/terrorist/HTTP-2-Rapid-Reset-ClientPOC详情
12Nonehttps://github.com/sigridou/CVE-2023-44487-POC详情
13Nonehttps://github.com/TYuan0816/cve-2023-44487POC详情
14Nonehttps://github.com/sn130hk/CVE-2023-44487POC详情
15Nonehttps://github.com/threatlabindonesia/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoCPOC详情
16RapidResetClienthttps://github.com/aulauniversal/CVE-2023-44487POC详情
17POC for CVE-2023-44487https://github.com/BMG-Black-Magic/CVE-2023-44487POC详情
18Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)https://github.com/internalwhel/rapidresetclientPOC详情
19HTTP/2 Rapid Reset Exploit PoChttps://github.com/moften/CVE-2023-44487POC详情
20Demo for detection and mitigation of HTTP/2 Rapid Reset vulnerability (CVE-2023-44487)https://github.com/zanks08/cve-2023-44487-demoPOC详情
21HTTP/2 Rapid Reset Exploit PoChttps://github.com/moften/CVE-2023-44487-HTTP-2-Rapid-Reset-AttackPOC详情
22A comprehensive Python testing tool for CVE-2023-44487, the HTTP/2 Rapid Reset vulnerability. This enhanced version provides granular control over testing parameters, multiple attack patterns, and advanced monitoring capabilities.https://github.com/madhusudhan-in/CVE_2023_44487-Rapid_ResetPOC详情
23Proof of concept for DoS exploit https://github.com/Appsynergy-io/CVE-2023-44487POC详情
24poc for the rst dos attack discovered in 2023https://github.com/tpirate/cve-2023-44487-POCPOC详情
25PoC for HTTP/2 Rapid Reset DDoS Vulnerability - CVE-2023-44487https://github.com/ReGeLePuMa/HTTP-2-Rapid-Reset-DDosPOC详情
26Replicable Blueprint for advanced DDoS Purple Teaming, engineered for the threat landscape. It integrates a Red Elite Teaming offensive suite—featuring multi-vector rotations, HTTP/2 Rapid Reset (CVE-2023-44487) exploitation, and mTLS 1.3-encrypted C2 orchestration—with a high-integrity 7-Tier Blue Elite Teaming defense-in-depth architecture.https://github.com/sastraadiwiguna-purpleeliteteaming/DDoS-Purple-Teaming-Offensive-Multi-Vector-7-Tier-Defensive-Holistic-Blueprint-POC详情
三、漏洞 CVE-2023-44487 的情报信息
四、漏洞 CVE-2023-44487 的评论

暂无评论


发表评论