dreadlocked / Drupalgeddon2

Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)
575 stars 174 forks source link

Connection reset by peer (Errno::ECONNRESET #70

Open mzrismuarf opened 1 year ago

mzrismuarf commented 1 year ago

[*] Testing: Code Execution (Method: name) [i] Payload: echo ZLUKVHEH /usr/lib/ruby/3.1.0/socket.rb:452:in __read_nonblock': Connection reset by peer (Errno::ECONNRESET) from /usr/lib/ruby/3.1.0/socket.rb:452:inread_nonblock' from /usr/lib/ruby/3.1.0/net/protocol.rb:212:in rbuf_fill' from /usr/lib/ruby/3.1.0/net/protocol.rb:193:inreaduntil' from /usr/lib/ruby/3.1.0/net/protocol.rb:203:in readline' from /usr/lib/ruby/3.1.0/net/http/response.rb:42:inread_status_line' from /usr/lib/ruby/3.1.0/net/http/response.rb:31:in read_new' from /usr/lib/ruby/3.1.0/net/http.rb:1575:inblock in transport_request' from /usr/lib/ruby/3.1.0/net/http.rb:1566:in catch' from /usr/lib/ruby/3.1.0/net/http.rb:1566:intransport_request' from /usr/lib/ruby/3.1.0/net/http.rb:1539:in request' from /usr/lib/ruby/3.1.0/net/http.rb:1532:inblock in request' from /usr/lib/ruby/3.1.0/net/http.rb:966:in start' from /usr/lib/ruby/3.1.0/net/http.rb:1530:inrequest' from drupalgeddon2.rb:53:in http_request' from drupalgeddon2.rb:96:ingen_evil_url' from drupalgeddon2.rb:475:in block in <main>' from drupalgeddon2.rb:467:ineach' from drupalgeddon2.rb:467:in `

'