Skip to content

MickCue/optionsbleed

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

optionsbleed ++

This is a proof of concept code to test for the Optionsbleed bug in Apache httpd (CVE-2017-9798).

Modified by MickCue: Uses requests and supports cookies to test authenticated URLs.

usage

optionsbleed [-h] [-n N] [-a] [-u] hosttocheck

Check for the Optionsbleed vulnerability (CVE-2017-9798).

positional arguments:
  hosttocheck  The hostname you want to test against

optional arguments:
  -h, --help    show this help message and exit
  -n N          number of tests (default 10)
  -a, --all     show headers from hosts without problems
  -u, --url     pass URL instead of hostname
  -c, --cookie  pass cookie value e.g. -c Session=53454bfgb
  -m, --methods test for malicious HTTP methods

Tests server for Optionsbleed bug and other bugs in the allow header.
Tests for HTTP methods
Tests for clickjacking

output explanation

The script outputs the returned Allow header and prefixes it with an explanation what is wrong with it.

[bleed]

A corrupted header was sent, very likely the Optionsbleed bug.

[empty]

An empty header was sent, which is bogus.

[spaces]

The list of methods was space-separated instead of comma-separated.

This is a bug, but harmless. It may be Launchpad bug #1717682.

[duplicates]

Some methods were sent multiple times in the list.

This is a bug, but harmless. It may be Apache bug #61207.

[ok]

Nothing wrong with this header (only sent with -a/--all).

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%