lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CADSYzsuBvyo6RbgpnQDr_Bfk9uV9q_4r4f88uUrJuvQ2cAg+GQ@mail.gmail.com>
Date: Tue, 27 Dec 2016 10:07:36 -0200
From: Dawid Golunski <dawid@...alhackers.com>
To: bugtraq@...urityfocus.com
Subject: PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]
PHPMailer < 5.2.18 Remote Code Execution
CVE-2016-10033
Here's an updated version of the advisory with more details + simple PoC.
Still incomplete. There will be more updates/exploits soon at:
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://twitter.com/dawid_golunski
--
Regards,
Dawid Golunski
https://legalhackers.com
t: @dawid_golunski
View attachment "PHPMailer-Exploit.txt" of type "text/plain" (10207 bytes)