Giter Club home page Giter Club logo

exploit-cve-2016-10033's Introduction

OPSXCQ's profile

Bringing debauchery and anarchy back.

exploit-cve-2016-10033's People

Contributors

opsxcq avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

exploit-cve-2016-10033's Issues

Not working, the $mail->setFrom($email,$name) first verifies the email, then sets the $this->Sender

I was looking at your exploit code and it looks like it won't work, as you are passing "vulnerables@ -OQueueDirectory=/tmp -X/backdoor.php" to the setFrom() function, and the setFrom() function first verifies the passed email by some regex, and your malformed email address will not pass the verification

public function setFrom($address, $name = '', $auto = true) { $address = trim($address); $name = trim(preg_replace('/[\r\n]+/', '', $name)); //Strip breaks and trim // Don't validate now addresses with IDN. Will be done in send(). if (($pos = strrpos($address, '@')) === false or (!$this->has8bitChars(substr($address, ++$pos)) or !$this->idnSupported()) and !$this->validateAddress($address)) { $error_message = $this->lang('invalid_address') . " (setFrom) $address"; $this->setError($error_message); $this->edebug($error_message);

There is a $this->validateAddress call, and if it fails, the function's execution is stopped and the following code is not executed
$this->From = $address; $this->FromName = $name; if ($auto) { if (empty($this->Sender)) { $this->Sender = $address; } }
Since $this->Sender is not set up with Sender's address then, the exploit will fail as it will use the default initialized value for $this->Sender.

All of the above code is from class.phpmailer.php

Mind Error

Olá uso Kali Linux 32bits em uma VM no Windows ME.
Seu script não está rodando como devia.

Bj, Xero, até!
🗡️

Help getting this to run on "Frankenstein" VM?

Hi there,

I'm working on a "Pentesting 101" talk and am trying to bolt together a Ubuntu Linux VM that will host a variety of popular vulnerabilities, and I'd love to get the PHPMailer exploit up and running (and certainly give you credit and point people towards your work). The Docker version works like a champ but I wanted to make my own native mail form so I could show people how to use your exploit to get a shell and then follow the path to exploring the VM file system, escalating privs, etc.

What I've done:

  • Installed sendmail
  • Plopped your index.php in /var/www/html
  • Copied the src directory to /var/www/html/phpmailer
  • Opened index.php and changed the PHPMailerAutoload.php path to be require 'phpmailer/PHPMailerAutoload.php';
  • Edited the path in exploit.sh to be /var/www/html/backdoor.php instead of /www/backdoor.php

When the exploit runs, I can watch syslog and see the email going through from the POST request. Exploit.sh output says the shell is established and backdoor.php created, but neither of those things is actually happening.

Can you think of anything else I can do troubleshoot this and get it functional?

Thanks,
Brian

Not sure how it works.

`./exploit.sh xxxxx:80
[+] CVE-2016-10033 exploit by opsxcq
[+] Exploiting xxxxx:80
[+] Target exploited, acessing shell at http://xxxxx:80/backdoor.php
[+] Running whoami
base64: invalid option -- d
Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file]
-h, --help display this message
-D, --decode decodes input
-b, --break break encoded string into num character lines
-i, --input input file (default: "-" for stdin)
-o, --output output file (default: "-" for stdout)

RemoteShell>

Whatever thing I input after this (like ls, cd, whoami), I always get this kind of error message

base64: invalid option -- d Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file] -h, --help display this message -D, --decode decodes input -b, --break break encoded string into num character lines -i, --input input file (default: "-" for stdin) -o, --output output file (default: "-" for stdout)

What is going on? Are there other commands?

Remote shell not responding

When I run the exploit on my vulnerable VM, the remote shell doesn't reply. Here's an example :

root@PenTest-Kali:/opt/spl0its# ./phpmail 192.168.80.146:8080
[+] CVE-2016-10033 exploit by opsxcq
[+] Exploiting 192.168.80.146:8080
[+] Target exploited, acessing shell at http://192.168.80.146:8080/backdoor.php
[+] Running whoami

RemoteShell> id
[+] Running id

RemoteShell> w
[+] Running w

why we can't use additional_parameters in safe_mode?

when I see to if else condition
if (ini_get('safe_mode') or !$this->UseSendmailOptions or is_null($params)) {
$result = @mail($to, $subject, $body, $header);
} else {
$result = @mail($to, $subject, $body, $header, $params);
}

in this case, I think if safe_mod is ON but $this->UseSendmailOptions is TRUE , the second condition "$result = @mail($to, $subject, $body, $header, $params);" still be processed
at 176 line code in class.phpmailer.php: "public $UseSendmailOptions = true;'

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.