Description
Inbit Messenger 4.6.0 - 4.9.0 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by exploiting a stack overflow in the messenger's protocol. Attackers can send specially crafted XML packets to port 10883 with a malicious payload to trigger the vulnerability and execute commands with system privileges.
Problem types
Product status
Credits
a-rey
References
github.com/...ain/writeups/Inbit_Messenger/v4.6.0/writeup.md
www.exploit-db.com/exploits/51127 (ExploitDB-51127)
web.archive.org/...review/Inbit-Messenger-Basic-Edition.html (Archived Software Download Page)
github.com/...ain/writeups/Inbit_Messenger/v4.6.0/writeup.md (Exploit Write-Up)
www.vulncheck.com/...henticated-remote-command-execution-rce (VulnCheck Advisory: Inbit Messenger 4.9.0 - Unauthenticated Remote Command Execution (RCE))