JAMES Remote Administration Tool


The earlier Nmap scan showed that the target port 4555 is open. Nmap also grabbed the network fingerprint, and it shows the service, JAMES Remote Administration Tool 2.3.2, and a prompt for authentication

This can be reproduced By connecting to the target port 4555 via Netcat, it prints out the same data string as well as a prompt for authentication

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/solidstate]
└─$ searchsploit Apache James 2.3.2
------------------------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                                       |  Path
------------------------------------------------------------------------------------- ---------------------------------
Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit) | linux/remote/48130.rb
Apache James Server 2.3.2 - Remote Command Execution                                 | linux/remote/35513.py
Apache James Server 2.3.2 - Remote Command Execution (RCE) (Authenticated) (2)       | linux/remote/50347.py
------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
------------------------------------------------------------------------------------- ---------------------------------
 Paper Title                                                                         |  Path
------------------------------------------------------------------------------------- ---------------------------------
Exploiting Apache James Server 2.3.2                                                 | docs/english/40123-exploiting-ap
------------------------------------------------------------------------------------- ---------------------------------

searchsploit result shows that there is a RCE exploit for `JAMES Remote Administration Tool 2.3.2

I will go over this later

Default Credential


i tried some default/weak credentials and was able to authentication with; root:root root is indeed confirmed to be a valid user from the SMTP enumeration

Enumeration


It makes sense that the credentials works here because this is supposedly the remote administration tool for Apache JAMES, On top of that, the SMTP, POP3, and NNTP services all are based on the Apache James as discovered from the initial Nmap scan

There are a lot of commands available

There are 5 users

Password Reset


Since Apache JAMES is a primary mail server, these 5 users must have their emails. I should be able to check these users emails as I am the root user who can modify their passwords.

So I changed all of their passwords to qwe123

I should now be able to authenticate to and read their email from the POP3 server I will get back to it.