exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/47307
This Metasploit module exploits CVE-2019-10149, a local privilege escalation vulnerability in Exim versions 4.87 to 4.91. It leverages improper validation in the deliver_message() function to execute commands with root privileges via a crafted RCPT TO field.
Classification
Working Poc 100%
Target:
Exim 4.87 - 4.91
No auth needed
Prerequisites:
Local access to the target system · Exim running and listening on a port (default 25) · Writable directory (default /tmp) · Bash availability
exploitdb
WORKING POC
VERIFIED
by Marco Ivaldi · bashlocallinux
https://www.exploit-db.com/exploits/46996
This exploit leverages CVE-2019-10149, a local privilege escalation vulnerability in Exim versions 4.87 to 4.91, by injecting a malicious recipient address to execute arbitrary commands as root. It supports two methods: creating a setuid shell or spawning a netcat reverse shell.
Classification
Working Poc 100%
Target:
Exim 4.87-4.91
No auth needed
Prerequisites:
Local access to a vulnerable Exim instance · Exim running with elevated privileges
exploitdb
WRITEUP
by Qualys Corporation · textremotelinux
https://www.exploit-db.com/exploits/46974
This is a detailed security advisory from Qualys describing CVE-2019-10149, a remote command execution vulnerability in Exim versions 4.87 to 4.91. The vulnerability allows arbitrary command execution as root via the `${run{...}}` expansion in recipient addresses, exploitable locally by default and remotely under certain configurations.
Classification
Writeup 100%
Target:
Exim 4.87 to 4.91
No auth needed
Prerequisites:
Exim server with vulnerable version · Ability to send emails to the target server · Non-default configurations for remote exploitation
nomisec
TROJAN
22 stars
by bananaphones · poc
https://github.com/bananaphones/exim-rce-quickfix
The repository contains a malicious script disguised as a fix for CVE-2019-10149 (Exim RCE). The 'malware_do_not_run.sh' script attempts to download and execute payloads from .onion domains via Tor2Web, while the 'exim_rce_fixer.sh' script pretends to patch Exim but includes suspicious cleanup routines.
Classification
Trojan 95%
Target:
Exim (versions affected by CVE-2019-10149)
No auth needed
Prerequisites:
Access to a vulnerable Exim instance · Ability to execute scripts on the target system
nomisec
WORKING POC
18 stars
by Diefunction · remote
https://github.com/Diefunction/CVE-2019-10149
The repository contains a functional exploit for CVE-2019-10149, targeting Exim versions 4.87 to 4.91. The exploit leverages improper validation in the deliver_message() function to achieve remote command execution via a crafted RCPT TO command.
Classification
Working Poc 95%
Target:
Exim 4.87 to 4.91
No auth needed
Prerequisites:
Network access to the Exim SMTP port (default 25) · Listener set up on attacker's machine
nomisec
WORKING POC
14 stars
by MNEMO-CERT · local
https://github.com/MNEMO-CERT/PoC--CVE-2019-10149_Exim
This repository contains a functional Python exploit for CVE-2019-10149, a remote command execution vulnerability in Exim. The PoC leverages a crafted SMTP RCPT TO command to execute arbitrary commands as root by exploiting a flaw in Exim's string expansion logic.
Classification
Working Poc 95%
Target:
Exim (4.87 - 4.91)
No auth needed
Prerequisites:
Network access to Exim SMTP port (default 25) · Exim version 4.87 to 4.91 · No ACL 'verify=recipient' restriction (for remote exploitation)
nomisec
WORKING POC
13 stars
by cowbe0x004 · poc
https://github.com/cowbe0x004/eximrce-CVE-2019-10149
This repository contains a functional exploit for CVE-2019-10149, a remote code execution vulnerability in Exim. The exploit includes a Python script for remote testing and a Bash script for local vulnerability checks, both of which attempt to create a file in /root/lweximtest to confirm exploitation.
Classification
Working Poc 95%
Target:
Exim (versions prior to patched versions)
No auth needed
Prerequisites:
Network access to the Exim SMTP port · Exim version vulnerable to CVE-2019-10149
nomisec
WORKING POC
9 stars
by AzizMea · local
https://github.com/AzizMea/CVE-2019-10149-privilege-escalation
This repository contains a functional exploit for CVE-2019-10149, a privilege escalation vulnerability in Exim. The exploit leverages a command injection flaw in the SMTP service to execute arbitrary commands as root via a crafted RCPT TO field.
Classification
Working Poc 95%
Target:
Exim (versions prior to 4.92.2)
No auth needed
Prerequisites:
Access to the SMTP service (port 25) · Exim version vulnerable to CVE-2019-10149
nomisec
WORKING POC
5 stars
by darsigovrustam · local
https://github.com/darsigovrustam/CVE-2019-10149
This repository provides a functional exploit for CVE-2019-10149, a remote command execution vulnerability in Exim versions 4.87 to 4.91. The exploit leverages the `${run{...}}` expansion in the SMTP `rcpt to:` command to execute arbitrary shell commands.
Classification
Working Poc 95%
Target:
Exim 4.87 < 4.91
No auth needed
Prerequisites:
Vulnerable Exim version (4.87 to 4.91) · Network access to the SMTP port (25)
nomisec
WORKING POC
4 stars
by Chris-dev1 · local
https://github.com/Chris-dev1/exim.exp
This repository contains a functional Python exploit for CVE-2019-10149, targeting Exim versions 4.87 to 4.91. The exploit leverages a remote command execution vulnerability via a crafted RCPT TO command, delivering a reverse shell payload.
Classification
Working Poc 95%
Target:
Exim 4.87 - 4.91
No auth needed
Prerequisites:
Network access to Exim SMTP port (default 25) · Listener setup for reverse shell
nomisec
WRITEUP
3 stars
by cloudflare · poc
https://github.com/cloudflare/exim-cve-2019-10149-data
This repository provides a collection of data and references related to Exim vulnerabilities, specifically CVE-2019-10149. It includes links to exploit details, advisories, and reports but does not contain functional exploit code.
Classification
Writeup 90%
Target:
Exim
No auth needed
nomisec
SCANNER
3 stars
by Brets0150 · poc
https://github.com/Brets0150/StickyExim
This repository contains a script to detect and log exploitation attempts of CVE-2019-10149 in Exim mail servers. It parses Exim logs for specific strings indicating exploit attempts and generates abuse reports for the attacking IPs.
Classification
Scanner 90%
Target:
Exim mail server
No auth needed
Prerequisites:
Exim mail server with logging enabled · Access to Exim log files
nomisec
WORKING POC
1 stars
by Stick-U235 · local
https://github.com/Stick-U235/CVE-2019-10149-Exploit
This exploit leverages CVE-2019-10149, a remote command execution vulnerability in Exim (4.87-4.91), by injecting a malicious payload into the RCPT TO field during an SMTP session. The payload spawns a netcat shell on port 31415 as root, allowing the attacker to gain remote access.
Classification
Working Poc 95%
Target:
Exim 4.87-4.91
No auth needed
Prerequisites:
Network access to the Exim SMTP service (port 25) · Exim version 4.87-4.91 running on the target
nomisec
WORKING POC
1 stars
by aishee · poc
https://github.com/aishee/CVE-2019-10149-quick
This repository contains a Bash script that automates the installation of vulnerable Exim versions to exploit CVE-2019-10149, a remote command execution vulnerability in Exim mail servers. The script checks for root privileges, identifies the Linux distribution, and installs or reinstalls Exim and curl to create a vulnerable environment.
Classification
Working Poc 90%
Target:
Exim (versions prior to 4.92.2)
No auth needed
Prerequisites:
Root access on the target system · Exim installed on the target system
nomisec
WORKING POC
by CybersRMUTL · remote
https://github.com/CybersRMUTL/CVE-2019-10149-Exim4-RCE
This repository contains a functional local privilege escalation exploit for CVE-2019-10149 in Exim versions 4.87 to 4.91. The exploit leverages a vulnerability in Exim's SMTP service to execute arbitrary commands as root by injecting a malicious payload into the RCPT TO field.
Classification
Working Poc 95%
Target:
Exim 4.87 - 4.91
Auth required
Prerequisites:
Local access to the target machine · Standard user privileges · Exim SMTP service running locally
nomisec
WORKING POC
by VoyagerOnne · remote
https://github.com/VoyagerOnne/Exim-CVE-2019-10149
This repository contains a functional exploit for CVE-2019-10149, a remote command execution vulnerability in Exim. The PoC leverages the vulnerability by sending a crafted SMTP command with an encoded payload to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Exim (versions prior to 4.92.2)
No auth needed
Prerequisites:
Network access to the Exim SMTP port (default 25) · A listener set up to receive the reverse shell or command output
nomisec
WORKING POC
by uyerr · remote
https://github.com/uyerr/PoC_CVE-2019-10149--rce
This repository contains a functional exploit for CVE-2019-10149, an RCE vulnerability in Exim versions 4.87 to 4.91. The exploit leverages a command injection flaw in the Exim SMTP service by sending a crafted RCPT TO command with a malicious payload that executes a reverse shell.
Classification
Working Poc 95%
Target:
Exim (4.87 to 4.91)
No auth needed
Prerequisites:
Network access to the Exim SMTP service (port 25) · A listener setup to receive the reverse shell
nomisec
STUB
by qlusec · local
https://github.com/qlusec/CVE-2019-10149
The repository contains only a minimal README with no functional exploit code or technical details. It lacks any meaningful content to demonstrate or analyze the vulnerability.
Target:
unknown
No auth needed
nomisec
WORKING POC
by hyim0810 · remote
https://github.com/hyim0810/CVE-2019-10149
This repository provides a functional exploit for CVE-2019-10149, a remote command execution vulnerability in Exim versions 4.87 to 4.91. The exploit leverages the `${run{...}}` expansion in the SMTP `rcpt to:` command to execute arbitrary shell commands, demonstrated by downloading and executing a reverse shell script.
Classification
Working Poc 95%
Target:
Exim 4.87 < 4.91
No auth needed
Prerequisites:
Vulnerable Exim version (4.87 to 4.91) · Network access to the SMTP port (25) · Misconfigured Exim to allow relaying
nomisec
STUB
by rahmadsandy · poc
https://github.com/rahmadsandy/EXIM-4.87-CVE-2019-10149
The repository contains only a README with a placeholder image and no functional exploit code or technical details. It appears to be a setup guide for educational purposes but lacks substance.
Target:
EXIM 4.87
No auth needed
Prerequisites:
none specified
nomisec
STUB
by Dilshan-Eranda · poc
https://github.com/Dilshan-Eranda/CVE-2019-10149
The repository contains only a minimal README with no exploit code or technical details. It appears to be a placeholder for an assignment on CVE-2019-10149.
Target:
unknown
No auth needed
vulncheck_xdb
WORKING POC
local
https://github.com/0xdea/exploits
This repository contains functional exploit code for CVE-2019-10149, a local privilege escalation vulnerability in Exim. The exploit leverages the 'Return of the WIZard' bug to gain root access.
Classification
Working Poc 100%
Target:
Exim (specific versions affected by CVE-2019-10149)
No auth needed
Prerequisites:
Local access to a vulnerable Exim installation
metasploit
WORKING POC
EXCELLENT
by Qualys, Dennis Herrmann, Marco Ivaldi, Guillaume André · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
This Metasploit module exploits CVE-2019-10149, a local privilege escalation vulnerability in Exim versions 4.87 to 4.91. It leverages improper validation in the deliver_message() function to execute commands with root privileges via a crafted RCPT TO field.
Classification
Working Poc 100%
Target:
Exim 4.87 - 4.91
No auth needed
Prerequisites:
Local access to the target system · Exim running and accessible on a TCP port (default 25) · Write permissions in a directory (default /tmp)