Skip to content

Detection method for Exim vulnerability CVE-2024-39929

Notifications You must be signed in to change notification settings

rxerium/CVE-2024-39929

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-39929 PoC

Vulnerability Brief

Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.

How does this detection method work?

Versions through 4.97.1 are vulnerable to this vulnerability. This template version matches for any instances of Exim prior to and including 4.87.1.

How do I run this script?

  1. Download Nuclei from here
  2. Copy the template to your local system
  3. Run the following command: nuclei -u https://yourHost.com -t template.yaml

References

Disclaimer

Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.

Contact

If you have any questions feel free to reach out to me on Signal or via email: [email protected].

About

Detection method for Exim vulnerability CVE-2024-39929

Resources

Stars

Watchers

Forks