Re: [exim] Infos: someone posted an none working exploit fo…

Top Page
Delete this message
Reply to this message
Author: Cyborg
Date:  
To: exim-users
Subject: Re: [exim] Infos: someone posted an none working exploit for exim
To keep you updated.... If you did not have changed your setup, it's
time to do it now...

Am 07.06.2013 15:53, schrieb Cyborg:
> https://www.redteam-pentesting.de/de/advisories/rt-sa-2013-001/-exim-with-dovecot-typical-misconfiguration-leads-to-remote-command-execution
>

theres now a Metasploit modul for this misconfiguration :

*Exim and Dovecot Insecure Configuration Command Injection*
<http://packetstormsecurity.com/files/download/121958/exim4_dovecot_exec.rb.txt>

This Metasploit module exploits a command injection vulnerability
against Dovecot with Exim using the "use_shell" option. It uses the
sender's address to inject arbitrary commands since this is one of the
user-controlled variables, which has been successfully tested on Debian
Squeeze using the default Exim4 with dovecot-common packages.