lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CADSYzsvufnoK0-zN-5tb1piww4g=+NxGdC+7cj-Wwk9WWvf9=g@mail.gmail.com>
Date: Tue, 27 Dec 2016 10:05:25 -0200
From: Dawid Golunski <dawid@...alhackers.com>
To: fulldisclosure@...lists.org
Subject: [FD] PHPMailer < 5.2.18 Remote Code Execution [updated advisory]
[CVE-2016-10033]
PHPMailer < 5.2.18 Remote Code Execution
CVE-2016-10033
Attaching an updated version of the advisory with more details + simple PoC.
Still incomplete. There will be more updates/exploits soon at:
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
and the feed:
https://twitter.com/dawid_golunski
--
Regards,
Dawid Golunski
https://legalhackers.com
t: @dawid_golunski
View attachment "PHPMailer-Exploit.txt" of type "text/plain" (10207 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/