Rapid7 Vulnerability & Exploit Database

UoW pop2d Remote File Retrieval Vulnerability

Back to Search

UoW pop2d Remote File Retrieval Vulnerability

Disclosed
07/14/2000
Created
05/30/2018

Description

This module exploits a vulnerability in the FOLD command of the University of Washington ipop2d service. By specifying an arbitrary folder name it is possible to retrieve any file which is world or group readable by the user ID of the POP account. This vulnerability can only be exploited with a valid username and password. The From address is the file owner.

Author(s)

  • aushack <patrick@osisecurity.com.au>

Development

References

  • OSVDB-368
  • BID-1484

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/pop2/uw_fileretrieval
msf auxiliary(uw_fileretrieval) > show actions
    ...actions...
msf auxiliary(uw_fileretrieval) > set ACTION < action-name >
msf auxiliary(uw_fileretrieval) > show options
    ...show and set options...
msf auxiliary(uw_fileretrieval) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;