Ipswitch IMail 5.0 / Ipswitch WS_FTP Server 1.0.1/1.0.2 - Local Privilege Escalation
Author: Marc
type: local
platform: windows
port:
date_added: 1999-02-04
date_updated: 2016-09-27
verified: 1
codes: CVE-1999-1171;OSVDB-10841;CVE-1999-1170
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/218/info
Non-administrative Imail and WS_FTP Server users may elevate their privileges to administrator for these applications by modifying a specific registry value. Once a person has obtained administrative privileges, they may use the application interface (locally) to read email, create accounts, delete accounts, etc.
Access the following registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Ipswitch\IMail\Domains\Machine_name\Users\Username"
Modify the Flag value to read "1920". 1920 gives the user account administrator permissions to IMail and WS_FTP Server.