# N/A
## 漏洞概述
在 PHPMailer 的 isMail 传输组件中,`mailSend` 函数存在一个漏洞,允许远程攻击者通过精心构造的 Sender 属性中的 `\"`(反斜杠双引号)传递额外参数到 mail 命令,从而执行任意代码。
## 影响版本
PHPMailer 5.2.18 之前的版本
## 漏洞细节
在受影响版本的 PHPMailer 库中,`mailSend` 函数没有正确处理 `Sender` 属性中的特殊字符 `\"`。攻击者可以通过在 `Sender` 属性中插入特殊字符,顺利绕过安全检查,向 mail 命令传递额外参数,最终执行任意代码。
## 影响
此漏洞可能导致远程代码执行,从而使攻击者能够通过精心构造的邮件发送请求,在未受影响服务器上执行恶意代码。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container | https://github.com/opsxcq/exploit-CVE-2016-10033 | POC详情 |
2 | Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045. | https://github.com/Zenexer/safeshell | POC详情 |
3 | RCE against WordPress 4.6; Python port of https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html | https://github.com/GeneralTesler/CVE-2016-10033 | POC详情 |
4 | Code and vulnerable WordPress container for exploiting CVE-2016-10033 | https://github.com/chipironcin/CVE-2016-10033 | POC详情 |
5 | WordPress 4.6 - Remote Code Execution (RCE) PoC Exploit | https://github.com/Bajunan/CVE-2016-10033 | POC详情 |
6 | None | https://github.com/qwertyuiop12138/CVE-2016-10033 | POC详情 |
7 | None | https://github.com/liusec/WP-CVE-2016-10033 | POC详情 |
8 | Exploits CVE-2016-10033 and CVE-2016-10045 | https://github.com/pedro823/cve-2016-10033-45 | POC详情 |
9 | To solve CTFS.me problem | https://github.com/awidardi/opsxcq-cve-2016-10033 | POC详情 |
10 | PHPMailer < 5.2.18 Remote Code Execution Exploit | https://github.com/0x00-0x00/CVE-2016-10033 | POC详情 |
11 | cve-2016-10033 | https://github.com/cved-sources/cve-2016-10033 | POC详情 |
12 | Remote Code Execution vulnerability in PHPMailer. | https://github.com/j4k0m/CVE-2016-10033 | POC详情 |
13 | PHPMailer < 5.2.18 Remote Code Execution | https://github.com/zeeshanbhattined/exploit-CVE-2016-10033 | POC详情 |
14 | wordpress docker | https://github.com/CAOlvchonger/CVE-2016-10033 | POC详情 |
15 | CTF based around CVE-2016-10033 | https://github.com/eb613819/CTF_CVE-2016-10033 | POC详情 |
16 | CVE-2016-10033 Wordpress 4.6 Exploit | https://github.com/ElnurBDa/CVE-2016-10033 | POC详情 |
17 | Proof Of Concept for the CVE-2016-10033 (PHPMailer) | https://github.com/Astrowmist/POC-CVE-2016-10033 | POC详情 |
18 | WordPress PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender property in isMail transport. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-10033.yaml | POC详情 |
19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Wordpress%204.6%20%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20PwnScriptum.md | POC详情 |
20 | A PoC of CVE-2016-10033 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2016-10033-PoC | POC详情 |
21 | None | https://github.com/alexander47777/CVE-2016-10033 | POC详情 |
暂无评论