exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mailtraq-update.txt

mailtraq-update.txt
Posted Nov 24, 2004
Authored by Travis Schack

Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.

tags | exploit, remote
SHA-256 | 9363a24390dc5f166823eede37366696be7abfad27c632dc5627567f22951267

mailtraq-update.txt

Change Mirror Download
Recently, a vulnerability was discovered by Reed Arvin in the Mailtraq 2.6.1.1677 administration console.  The vendor provided solution does not fully mitigate the privilege escalation vulnerability.  You will find the original vulnerability advisory and the updated work around exploit information below.

[Original Vulnerability Advisory]
-------------------------------------------------------------
Summary:
A privilege escalation flaw exists in Mailtraq Version 2.6.1.1677 (http://www.mailtraq.com/).

Details:
A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console.

Vulnerable Versions:
Mailtraq Version 2.6.1.1677.

Solution:
The vendor was notified. Vendor response:

| This does not appear to be a security hole as the Mailtraq Console
| is intended to be operated only by authorized administrators. The
| console provides direct access to user data and the ability to
| manipulate e-mail and other sensitive data for all users. For
| this reason, in environments where non-administrators may be
| granted physical access to the desktop we expect administrators
| to secure the console by password protection. (This feature is
| enabled in the Server Properties.) If the console is secured in
| this manner, standard dialog functions such as that you described
| are only available to administrators.

Exploit:
1. Double click on the Mailtraq icon in the Taskbar
2. Right click in the right text pane and choose View Source
3. Notepad should open. Click File, click Open
4. In the Files of type: field choose All Files
5. Navagate to %WINDIR%\System32\
6. Right click on cmd.exe and choose Open
7. A command prompt will launch with SYSTEM privileges

Discovered by Reed Arvin reedarvin[at]gmail[dot]com

--------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------

Additional Exploit Information (work around password protection):

The vendor solution does not fully mitigate the privilege escalation vulnerability. The password protection mechanism successfully limits the access to the console, but a local user can perform the following steps to successfully escalate their privileges. The vendor has been notified of the vulnerability update.

1. Right click on the Mailtraq icon in the Taskbar
2. Select "About Mailtraq"
3. In the "Technical Support" section, click on "my.mailtraq.com" (or any other URL in the support window). This will open IE. (Assuming IE is the default browser setting for you).
4. Click File, click Open
5. Click Browse
6. Navigate to %WINDIR%\System32\
7. Right click on cmd.exe and choose Open
8. A command prompt will launch with SYSTEM privileges

Discovered by Travis Schack Travis[at]Vitalisec[dot]com
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close