Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hex0punk/cont-flood-poc
PoC for CVE-2023-45288, continuation flood vulnerability
https://github.com/hex0punk/cont-flood-poc
Last synced: 12 days ago
JSON representation
PoC for CVE-2023-45288, continuation flood vulnerability
- Host: GitHub
- URL: https://github.com/hex0punk/cont-flood-poc
- Owner: hex0punk
- Created: 2024-04-12T07:36:39.000Z (7 months ago)
- Default Branch: main
- Last Pushed: 2024-04-16T03:01:52.000Z (7 months ago)
- Last Synced: 2024-06-19T12:23:16.150Z (5 months ago)
- Language: Go
- Size: 24.4 KB
- Stars: 3
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# PoC for CVE-2023-45288
This is a proof-of-concept code for the CONTINUATION flood vulnerability found and documented by Bartek Nowotarski. The technical details are very well documented in his blog post [here](https://nowotarski.info/http2-continuation-flood-technical-details/). While my focus was on the Go bug as documented by the researcher, this code should be helpful in testing other CVEs related to this issue.
This code borrows some inspiration from:
1. The PoC code for the rapid reset vulnerability from https://github.com/secengjeff/rapidresetclient
2. Test code added after the vulnerability was patched by the Go team, located in [golang/net/http2/server_test.go](https://github.com/golang/net/blob/ba872109ef2dc8f1da778651bd1fd3792d0e4587/http2/server_test.go#L4790)My initial goal was to understand the vulnerability in detail, in addition to developing a tool for testing this issue at work. This was also very helpful when working on understanding the inner workings of http2 in detail. Other sources that were helpful include:
- Daniel Stenberg's [http2 explained](https://daniel.haxx.se/http2/) book
- [rfc 7540](https://www.rfc-editor.org/rfc/rfc7540)## Testing with the included server
You can run the included `server.go` file which runs on a vulnerable version of golang.org/x/net (0.20.0).
```shell
$ go run server.go
```The server runs on port 8443, which the client points to by defaults.
## Expected output
When ran against vulnerable servers, the client will be able to continue to send CONTINUATION frames for as long as you specify for the `wait` flag in seconds. The server prints its CPU usage every 2 seconds, which you will see increase rapidly as the client runs. In patched versions (0.23.0 and above), the server will close the connection once the header size limit is reached.
## Example
Run the client, creating 6 concurrent connections, calling https://localhost:8443, and sending continuation frames for 200 seconds for each connection:
```shell
$ go run client.go -time-limit 200 -connections 6 -url https://localhost:8443
```