|
Message-ID: <CADSYzsun=xdfigzGDDjwJf8TKZ73jb8L+jnntP3yQoZRZ--SWA@mail.gmail.com>
Date: Tue, 27 Dec 2016 09:45:48 -0200
From: Dawid Golunski <dawid@...alhackers.com>
To: oss-security@...ts.openwall.com
Subject: PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]
PHPMailer < 5.2.18 Remote Code Execution
CVE-2016-10033
Attaching an updated version of the advisory with more details + simple PoC.
Still incomplete. There will be more updates/exploits soon at:
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://twitter.com/dawid_golunski
--
Regards,
Dawid Golunski
https://legalhackers.com
t: @dawid_golunski
View attachment "PHPMailer-Exploit.txt" of type "text/plain" (10207 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.