Need help exploiting CVE-2010-4345 using exim4_string_format on a virtual server
I need help exploiting CVE-2010-4345 using exim4_string_format on a virtual server. I've been following a beginners pen testing book by and I'm stuck on getting root access to the mail server file system that is provided with the book. I am using msfconsole  and the tool is (obviously) exim4_string_format. My payload, as specified by the book, is reverse_perl.

The problem I am facing is not that I cannot connect to the target server, but a shell connection will not open. I've looked this up and found nothing, not even an error code, so I am asking here.

Thank you for your help, and I will get a screenshot of the output in a second..... Big Grin
just run the payload on the Target Machine and try to connect back to it by nc from than you can Privesc your way to root.

Possibly Related Threads…
Thread Author Replies Views Last Post
  I think I fucked up. I need urgent advice GreenHorse 8 631 01-21-2022, 04:13 PM
Last Post: GreenHorse
  Career direction help yinktry 1 870 01-16-2022, 03:51 PM
Last Post: enmafia2
  PrintNightmare Vulnerability | CVE 2021-1675 & CVE-2021-34527 Insider 1 744 01-11-2022, 06:28 PM
Last Post: Insider
  Student card hacking help GreenHorse 2 4,243 11-12-2021, 02:14 PM
Last Post: Lewis