Skip to content

Microsoft Windows 'HTTP.sys' - Remote Code Execution

ID: CVE-2015-1635

Severity: critical

Author: Phillipo

Tags: cve,cve2015,kev,microsoft,iis,rce

HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka “HTTP.sys Remote Code Execution Vulnerability.”

id: CVE-2015-1635
info:
name: Microsoft Windows 'HTTP.sys' - Remote Code Execution
author: Phillipo
severity: critical
description: |
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
reference:
- https://www.exploit-db.com/exploits/36773
- https://www.securitysift.com/an-analysis-of-ms15-034/
- https://nvd.nist.gov/vuln/detail/CVE-2015-1635
- http://www.securitytracker.com/id/1032109
- https://github.com/b1gbroth3r/shoMe
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
cvss-score: 10
cve-id: CVE-2015-1635
cwe-id: CWE-94
epss-score: 0.9754
epss-percentile: 0.99994
cpe: cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: microsoft
product: windows_7
shodan-query:
- '"Microsoft-IIS" "2015"'
- '"microsoft-iis" "2015"'
- cpe:"cpe:2.3:o:microsoft:windows_7"
tags: cve,cve2015,kev,microsoft,iis,rce
http:
- method: GET
path:
- "{{BaseURL}}"
headers:
Range: "bytes=0-18446744073709551615"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "HTTP Error 416"
- "The requested range is not satisfiable"
condition: and
- type: word
part: header
words:
- "Microsoft"
# digest: 4a0a0047304502202db0495d59353e56464c598ca0428bf2683e1a70bfe6925208b7558a2b45ec800221009a690006e20ef597c1f598f334928715099d2ab27d24b69316967ce9ca9e4d86:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-1635.yaml"

View on Github