Vulnerability & Exploit Database

Back to search

UoW pop2d Remote File Retrieval Vulnerability

This module exploits a vulnerability in the FOLD command of the University of Washington ipop2d service. By specifying an arbitrary folder name it is possible to retrieve any file which is world or group readable by the user ID of the POP account. This vulnerability can only be exploited with a valid username and password. The From address is the file owner.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/admin/pop2/uw_fileretrieval

Authors

  • aushack <patrick [at] osisecurity.com.au>

References

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/pop2/uw_fileretrieval msf auxiliary(uw_fileretrieval) > show actions ...actions... msf auxiliary(uw_fileretrieval) > set ACTION <action-name> msf auxiliary(uw_fileretrieval) > show options ...show and set options... msf auxiliary(uw_fileretrieval) > run