Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-1447 PoC — ISC BIND 安全特征问题漏洞

Source
Associated Vulnerability
Title:ISC BIND 安全特征问题漏洞 (CVE-2008-1447)
Description:ISC BIND是美国ISC公司的一套实现了DNS协议的开源软件。 ISC BIND 4版本、8版本和9.2.9版本中的DNS协议存在安全特征问题漏洞。该漏洞是源于网络系统或产品中缺少身份验证、访问控制、权限管理等安全措施。
Description
Fix for undefined method each in Metasploit’s bailiwicked_domain.rb (CVE-2008-1447 DNS cache poisoning module)
Readme
# 🚀 metasploit-bailiwicked_domain-fix
**Fix for `undefined method each` in Metasploit’s `bailiwicked_domain.rb` (CVE-2008-1447 DNS cache poisoning module)**  

---

## 🔎 Problem
While testing **CVE-2008-1447** using Metasploit, the original module crashed with:

```
undefined method `each` for an instance of IPAddr (NoMethodError)
```

This happens because the code calls **`.each` on an `IPAddr` object** instead of an array.

---

## 🛠️ Fix
The fix is to **wrap the IP object in an array before iterating**:

```ruby
[ip].each do |addr|
  # original code logic
end
```

✅ This prevents the **NoMethodError** and allows the module to run successfully.  

---

## 📌 Usage
1. **Replace** your original `bailiwicked_domain.rb` with the fixed one in this repo.  
   - Location: `/usr/share/metasploit-framework/modules/auxiliary/spoof/dns/bailiwicked_domain.rb`  
2. **Restart** Metasploit.  
3. **Load and run** the module as usual.  

---

## 📝 Notes
- Tested on Metasploit Framework version: [6.4.69-dev]
- This fix only addresses the IPAddr.each crash — functionality remains the same.

---

## ⚠️ Disclaimer
This module exploits a **known DNS vulnerability (CVE-2008-1447)**.  
👉 Use **only in a controlled lab environment** for **research and educational purposes**.  

---

✨ If this fix helped you, consider giving the repo a ⭐!
File Snapshot

[4.0K] /data/pocs/6489f1425db029037a0fabeb996d9721a1781b22 ├── [ 15K] bailiwicked_domain.rb └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.