module

UoW pop2d Remote File Retrieval Vulnerability

Disclosed
Jul 14, 2000
Created
May 30, 2018

Description

This module exploits a vulnerability in the FOLD command of the
University of Washington ipop2d service. By specifying an arbitrary
folder name it is possible to retrieve any file which is world or group
readable by the user ID of the POP account. This vulnerability can only
be exploited with a valid username and password. The From address is
the file owner.

Author

aushack patrick@osisecurity.com.au

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/admin/pop2/uw_fileretrieval
msf auxiliary(uw_fileretrieval) > show actions
...actions...
msf auxiliary(uw_fileretrieval) > set ACTION < action-name >
msf auxiliary(uw_fileretrieval) > show options
...show and set options...
msf auxiliary(uw_fileretrieval) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.