Lucene search

K
exploitdbMarcEDB-ID:19167
HistoryFeb 04, 1999 - 12:00 a.m.

Ipswitch IMail 5.0 / Ipswitch WS_FTP Server 1.0.1/1.0.2 - Local Privilege Escalation

1999-02-0400:00:00
Marc
www.exploit-db.com
26

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/218/info

Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc. 

Access the following registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Ipswitch\IMail\Domains\Machine_name\Users\Username"
Modify the Flag value to read "1920". 1920 gives the user account administrator permissions to IMail and WS_FTP Server. 

AI Score

7.4

Confidence

Low

Related for EDB-ID:19167