vendor:
Axigen eMail Server
by:
fuGich
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: Axigen eMail Server
Affected Version From: Axigen eMail Server v2.0 (beta)
Affected Version To: Axigen eMail Server v2.0 (beta)
Patch Exists: NO
Related CWE: CVE not provided
CPE: a:axigen:axigen_email_server:2.0
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2023-22024/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-20212/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-24834/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-27395/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-22325/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/apple-osx-cups-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-34241/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-3326/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3138/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2023-0121/, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=4, https://www.rapid7.com/db/?q=CVE+not+provided&type=&page=2
Platforms Tested:
2006
Remote Shell Format String Vulnerability in Axigen eMail Server v2.0 (beta)
This exploit takes advantage of a format string vulnerability in the pop3 service of Axigen eMail Server v2.0 (beta) to execute /bin/sh and bind to port 31337. The exploit uses an optimised format string generated with libforSC, using hhn for writes. The logType for the pop3 service must be set to "system" and the logLevel must have the 4th bit set.
Mitigation:
Update to a patched version of Axigen eMail Server.