10
CVSSv2

CVE-2022-21907

Published: 11/01/2022 Updated: 21/12/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 896
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

HTTP Protocol Stack Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows 10 20h2

microsoft windows 10 21h1

microsoft windows 11 -

microsoft windows server 20h2

microsoft windows server 2022

microsoft windows 10 21h2

Exploits

Microsoft HTTP protocol stack denial of service exploit that leverages the vulnerability in CVE-2022-21907 ...
Proof of concept for a Microsoft HTTP protocol stack vulnerability that causes a denial of service ...

Github Repositories

In this repo, I am collecting POCs github repositories log4j CVE-2022-21907 - Double Free in httpsys driver githubcom/p0dalirius/CVE-2022-21907-httpsys Code analyse includes static code anaylse tools Especialy for PHP

An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.

cve-2022-21907-httpsys by 1vere$k CVE-2022-21907 - Double Free in httpsys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (httpsys) to process packets, resulting in a kernel crash Vulnerable systems Windows Server 20

An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.

cve-2022-21907-httpsys by 1vere$k CVE-2022-21907 - Double Free in httpsys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (httpsys) to process packets, resulting in a kernel crash Vulnerable systems Windows Server 20

Exploit CVE For more CVE Exploits visit: Exploit CVE CVE Lists CVE-2022-1388 CVE-2022-21907

Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.

nmap-CVE-2022-21907 Repository containing nse script for vulnerability CVE-2022-21907 It is a component (IIS) vulnerability on Windows It allows remote code execution The vulnerability affects the kernel module httpsys, which handles most basic IIS operations After uploading the payload, the server should stop working (DoS) Usage ┌──(kali㉿kali)-[~/nmap-CVE-2022-21

POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability create by Malwareman at 2022-09-17 Detail HTTP Protocol Stack Remote Code Execution Vulnerability Similar to [[githubcom/antx-code/CVE-2021-31166][CVE-2021-31166]] This problem exists, from last year which is repo

cve-2022-21907

CVE-2022-21907 This package will detect exploits of CVE-2022-21907 corelightcom/blog/detecting-cve-2022-21907 Detection Method: HTTP HTTP data must be >= 1750 bytes, and The HTTP/11 is not observed at the end of the exploit HTTP request Usage: $ zeek -Cr yourpcap packages $ cat noticelog #separator \x09 #set_separator , #empty_field (empty) #unset_fie

CVE-2022-21907漏洞RCE PoC

CVE-2022-21907-RCE CVE-2022-21907漏洞RCE PoC 使用说明: go run /CVE-2022-21907go -h

CVE-2022-21907 - HTTP Protocol Stack Remote Code Execution Vulnerability ⚠️ For educational and authorized security research purposes only Original Exploit Authors Very grateful to the original PoC author NU11SECURITY and michelep Description: HTTP Protocol Stack Remote Code Execution Vulnerability This vulnerability would cause a denial-of-service attack to a target s

2022 Spring Prof. 謝續平

CVE-2022-21907 2022 Spring Prof 謝續平

PoC for CVE-2021-31166 and CVE-2022-21907

Home-Demolisher PoC for CVE-2021-31166 and CVE-2022-21907 Usage: usage: CVE-2021-31166py [-h] [-u URL] [-l LIST] [-o OUTPUT] Description message options: -h, --help show this help message and exit -u URL, --url URL IIS Server url For instance: 1921681110 -l LIST, --list LIST IIS Server urls list For instance: subdomaintxt -o OUTPUT, --output OUT

CVE-2022-21907

CVE-2022-21907 CVE-2022-21907

CVE-2022-21907 Vulnerability PoC

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability create by antx at 2022-01-17, just some small fixes by Michele “o-zone@zerozoneit” Detail HTTP Protocol Stack Remote Code Execution Vulnerability Similar to CVE-2021-31166 This problem exists, from last year which is reported on CVE-2021-3116

A REAL DoS exploit for CVE-2022-21907

CVE-2022-21907 A REAL DoS exploit for CVE-2022-21907 It supports IPv4/IPv6/HTTP/HTTPS Affect - Windows - 10 Version 1809 for 32-bit Systems - 10 Version 1809 for x64-based Systems - 10 Version 1809 for ARM64-based Systems - 10 Version 21H1 for 32-bit Systems - 10 Version 21H1 for x64-based System - 10 Version 21H1 for ARM64-based Systems - 10 Version

Multithread Golang application

CVE-2022-21907 Golang Application by 1vere$k CVE-2022-21907 - Double Free in httpsys driver Summary This is a multithreading Golang application wich allows make requests on few targets simultaneously Not very productive with the POST requests but it provides nearly 30% of speed comparing to a linear method An unauthenticated attacker can send an HTTP request with an "A

Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers

CVE-2022-21907 - Double Free in httpsys driver CVE-2022-21907 - Double Free in httpsys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (httpsys) to process packets, resulting in a kernel c

CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.

CVE-2022-21907 Description This repository detects a system vulnerable to CVE-2022-21907 (CVSS:31 98) and protects against this vulnerability if desired I offer 2 powershell codes in 1 line I propose pure python, powershell, ruby scripts and metasploit, nmap modules to attack a vulnerable IIS Web Server (perform a DOS attack to crash (blue screen) the server) Detection a

Web App Government Data Analysis Python Security tools PickleExploit Documentation WebSiteClonerHTTPLogger Documentation WebSiteClonerWebSiteCloner Documentation PyEmailToolsEmail Documentation PyEmailToolsForger Documentation PyEmailToolsImapClient Documentation PyEmailToolsPopClient Documentation PyEmailToolsReader Documentation PyEmailToolsSmtpCli

Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.

CVE-2022-21907 Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash Table of Contents CVE-2022-21907 Description Environment Victim Machine Configuration Attacker Machine Configuration Exploit Proof of Concept References Description CVE-2022-21907 is a vulnerability in the HTTP Protocol Stack (httpsys) of Windows 10 that coul

HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability create by antx at 2022-01-17 Detail HTTP Protocol Stack Remote Code Execution Vulnerability Similar to CVE-2021-31166 This problem exists, from last year which is reported on CVE-2021-31166, and still there CVE Severity attackComplexity: LOW atta

Recent Articles

Microsoft starts 2022 with big bundle fixes for 96 security bugs in its software
The Register • Thomas Claburn in San Francisco • 12 Jan 2022

Get our weekly newsletter Nothing is certain except death, taxes, and programming errors

Patch Tuesday The new year brings the same old chore of shoring up Microsoft software. For its first Patch Tuesday of 2022, Redmond has bestowed 96 new CVEs affecting its Windows products. If you include 24 Chromium CVEs published earlier this month and now addressed in Microsoft's Edge browser, in addition to two CVEs in open source projects (Curl and Libarchive), you get 122 fixes that need to be applied. Affected systems include: Windows and associated components, Edge, Exchange Server, Offic...