exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Alt-N MDaemon WebAdmin Remote Code Execution

Alt-N MDaemon WebAdmin Remote Code Execution
Posted Feb 21, 2013
Authored by Demetris Papapetrou, QSecure | Site qsecure.com.cy

The Alt-N MDaemon version 13.0.3 WebAdmin application suffers from a remote code execution vulnerability via the user account import facility.

tags | exploit, remote, code execution
SHA-256 | b1e0f846c97665c28984ae715b8e4178e351676b7e1aef82d5ac59c0302500d2

Alt-N MDaemon WebAdmin Remote Code Execution

Change Mirror Download
==================================================================
Alt-N MDaemon's WebAdmin Remote Code Execution Vulnerability
==================================================================

Software: Alt-N MDaemon v13.0.3 and prior versions
Vendor: http://www.altn.com/
Vuln Type: Remote Code Execution
Remote: Yes
Local: No
Discovered by: QSecure and Demetris Papapetrou
References: http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WebAdmin_Remote_Code_Execution.html
Discovered: 01/10/2012
Reported: 19/12/2012
Fixed: 15/01/2013 (http://files.altn.com/MDaemon/Release/RelNotes_en.html)
Disclosed: 18/02/2013

VULNERABILITY DESCRIPTION:
==========================
Alt-N WebAdmin application is prone to a remote code execution
vulnerability via the user account import facility. Attackers may
utilize a compromised user/non-admin account to create new accounts in
the system or modify existing ones, in a way that will turn-on the
autorespond "program processing" functionality and cause it to execute
arbitrary commands on the underlying operating system.

Furthermore, utilizing the user account import facility, an ordinary
user can change the password of any other user or administrator
account within MDaemon and access his/her emails. However, a
side-effect of this procedure is that any administrator accounts that
get modified this way, are downgraded to ordinary users.

Alt-N MDaemon v13.0.3 & v12.5.6 were tested and found vulnerable;
other versions may also be affected.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close