Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2004-1561 PoC — Icecast远程任意指令执行漏洞

Source
Associated Vulnerability
Title:Icecast远程任意指令执行漏洞 (CVE-2004-1561)
Description:Icecast是一款免费开放源代码的音频流服务程序,可使用在多种Unix/Linux操作系统平台下,也可以使用在Microsoft Windows操作系统下。 Icecast对HTTP的头字段数据缺少充分检查,远程攻击者可以利用这个漏洞以服务进程权限在系统上执行任意指令。 Icecast Server最多接收客户端带有32个头结构字段的HTTP请求,在某些环境下(Win32)第32头结构会覆盖函数的返回地址。也就是说攻击者可以使用普通的HTTP请求加上31头结构字段在加上SHELLCODE就可能不需要跳转
Description
My notes for CVE-2004-1561 IceCast exploitation
Readme
# [CVE-2004-1561](https://www.cvedetails.com/cve/CVE-2004-1561/) Exploitation notes

------------
Hello everyone,
I'm sharing with you my notes of exploitation [CVE-2004-1561](https://www.cvedetails.com/cve/CVE-2004-1561/) of Icecast on Windows 7 machine
If you want to try it on your own [here's a great lab](https://tryhackme.com/room/ice)
#### How to open my notes
I saved my notes in .ctd extension, and opening it in plaintext is chaotic.
You need to have specialized note-taking software in order to open this properly.
One of many is [CherryTree](https://github.com/giuspen/cherrytree)
After you open my notes with this file, it should be in I normal human-readable format.
File Snapshot

[4.0K] /data/pocs/64beddf7e8c36980351272fe1467fa689ff80462 ├── [6.4K] Ice.ctd ├── [ 34K] LICENSE └── [ 681] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.