Back to list
Lotus Protector for Mail Security remote code execution
Apr 04 2017 06:09AM
Patrick Webster (patrick osisecurity com au)
Lotus Mail Encryption Server 220.127.116.11 (Protector for Mail)
Local File Inclusion to Remote Code Execution
There is local file inclusion vulnerability in
the Lotus Mail Encryption Server (Protector for Mail Encryption)
administration setup interface. The index.php file uses an unsafe include()
where an unauthenticated remote user may read (traversal) arbitrary
By abusing a second bug within Lotus, we can inject our payload
into a known location and call it via the LFI to gain remote code execution.
Version 18.104.22.168 Build(22.214.171.124.4323) is known to be vulnerable.
You may need to set DATE in the format YYYY-MM-DD to get this working,
where the remote host and metasploit instance have UTC timezone differences.
Discovered by Patrick Webster
09-Nov-2012 - Exploit released.
04-Apr-2017 - Public advisory.
About OSI Security:
OSI Security is an independent network and computer security auditing
and consulting company based in Sydney, Australia. We provide internal
and external penetration testing, vulnerability auditing and wireless
site audits, vendor product assessments, secure network design,
forensics and risk mitigation services.
We can be found at http://www.osisecurity.com.au/
[ reply ]
Copyright 2010, SecurityFocus