Share
## https://sploitus.com/exploit?id=9814661A-35A4-5DB7-BB25-A1040F365C81
# HTTP/2 Rapid Reset: CVE-2023-44487
## Description
This repository contains proof-of-concept (PoC) code for the HTTP/2 Rapid Reset vulnerability identified as CVE-2023-44487.
## Vulnerability Overview
- **CVE ID**: CVE-2023-44487
- **Impact**: Denial of Service (DoS)
- **Affected Protocols**: HTTP/2
- **Affected Components**: Web servers, Reverse Proxies, Load Balancers
- **Disclosure Date**: 2023-10-10
## Getting Started
### Prerequisites
- Python 3.x
- `hyper`
Install prerequisites:
```bash
pip install hyper
```
### Usage
1. Clone the repository:
```bash
git clone https://github.com/imabee101/CVE-2023-44487.git
```
2. Navigate into the directory:
```bash
cd CVE-2023-44487
```
3. Execute the PoC:
```bash
python main.py
```
## References
- [Official CVE Record](https://vulners.com/cve/CVE-2023-44487)
- [Vendor Advisory](https://github.com/caddyserver/caddy/issues/5877)
- [Other Related Research](https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/)