关联漏洞
标题:
SmarterTools SmarterMail 代码问题漏洞
(CVE-2019-7214)
描述:Smartertools SmarterTools SmarterMail是美国SmarterTools(Smartertools)公司的一套邮件服务器软件。该软件支持垃圾邮件过滤、数据统计、简单邮件传输协议SMTP验证等功能。 SmarterTools SmarterMail build 6985之前的16.x版本中存在安全漏洞。攻击者可利用该漏洞在服务器上运行命令。
描述
For CTF use only (the CVE-2019-7214 also resolves the host from /etc/hosts)
介绍
# Windows Reverse Shell Exploit (PowerShell over TCP)
This Python script targets a vulnerable service running on a remote Windows machine. It sends a serialized .NET payload that launches a PowerShell-based reverse shell back to the attacker's machine.
# CVE-2019-7214
Remote Code Execution in .NET deserialization for the SmarterMail system.
---
## ⚙️ Configuration
Update the script’s configuration section to match your environment:
```python
HOSTNAME = 'hostname' # Target hostname (resolved via /etc/hosts)
PORT = 9999 # Target port listening for serialized input
LHOST = '192.168.45.185' # Attacker IP (listener)
LPORT = 4444 # Attacker listening port
```
---
## 🧪 What It Does
- Resolves the target's hostname to an IP address.
- Constructs a PowerShell reverse shell command.
- Base64-encodes the command in UTF-16LE format.
- Appends it to a pre-built serialized .NET payload blob.
- Sends the payload over a TCP connection to the target.
---
## 🛠 Requirements
- Python 3.x
- Netcat or a similar tool listening on the attacker's port:
```bash
nc -lvnp 4444
```
---
## 🚀 Usage
```bash
python3 CVE-2019-7214 .py
```
If successful, you'll get a PowerShell prompt from the target on your listener.
---
## 🧼 Notes
- Make sure the target accepts serialized .NET input over the specified port.
- This script assumes the target can execute deserialized objects containing `System.Management.Automation` functionality.
- Be careful with spacing, encoding, and payload size – the PowerShell command is padded to exactly 1360 bytes to avoid corruption.
---
## ⚠️ Disclaimer
This script is provided for **educational purposes only**. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical.
文件快照
[4.0K] /data/pocs/a414032aaa851f72389667fcf59e3f6000c82ca6
├── [3.5K] CVE-2019-7214.py
└── [1.8K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。