Skip to content

Exploiting PHPMail with back connection (reverse shell) from the target

Notifications You must be signed in to change notification settings

paralelo14/CVE_2016-10033

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE_2016-10033

Exploiting PHPMail with back connection (reverse shell) from the target

https://www.exploit-db.com/exploits/40974/

Usage:

1 - Download docker vulnerable enviroment at: https://github.com/opsxcq/exploit-CVE-2016-10033
2 - Config your IP for reverse shell on payload variable
4 - Open nc listener in one terminal: $ nc -lnvp <your ip>
3 - Open other terminal and run the exploit: python3 anarcoder.py

Video PoC:

https://www.youtube.com/watch?v=DXeZxKr-qsU

Full Advisory:

https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html

About

Exploiting PHPMail with back connection (reverse shell) from the target

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages