nomisec
WORKING POC
405 stars
by opsxcq · remote
https://github.com/opsxcq/exploit-CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a remote code execution vulnerability in PHPMailer versions before 5.2.18. The exploit leverages improper filtering of special characters in the 'From' address to inject malicious parameters into the mail command, leading to arbitrary code execution.
Classification
Working Poc 100%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target running PHPMailer < 5.2.18 · PHP version < 5.2.0 or no PCRE installed · Safe mode disabled
nomisec
WORKING POC
9 stars
by GeneralTesler · remote
https://github.com/GeneralTesler/CVE-2016-10033
This repository contains a functional Python exploit for CVE-2016-10033, which targets a remote code execution vulnerability in WordPress 4.6 via the lost password functionality. The exploit crafts a malicious Host header to inject commands, downloads a reverse shell payload, and executes it on the target system.
Classification
Working Poc 95%
Target:
WordPress 4.6
No auth needed
Prerequisites:
Target running WordPress 4.6 · Network access to the target · Python environment with 'requests' library
nomisec
STUB
8 stars
by Zenexer · poc
https://github.com/Zenexer/safeshell
The repository contains only a README file describing a tool to prevent PHP vulnerabilities but lacks any exploit code or technical details. It does not demonstrate or analyze CVE-2016-10033.
Target:
PHP
No auth needed
nomisec
WORKING POC
6 stars
by 0x00-0x00 · remote
https://github.com/0x00-0x00/CVE-2016-10033
This repository contains a functional Go-based exploit for CVE-2016-10033, targeting PHPMailer versions before 5.2.18. The exploit crafts a malicious HTTP POST request to achieve remote code execution by leveraging a vulnerability in PHPMailer's email handling.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target must be running a vulnerable version of PHPMailer · Target must have a web form that uses PHPMailer for sending emails
nomisec
WORKING POC
2 stars
by pedro823 · poc
https://github.com/pedro823/cve-2016-10033-45
This repository contains a functional exploit PoC for CVE-2016-10033, targeting PHPMailer 5.2.17. It includes a Dockerized environment with a vulnerable PHPMailer setup and a script to demonstrate the vulnerability.
Classification
Working Poc 90%
Target:
PHPMailer 5.2.17
No auth needed
Prerequisites:
Docker environment · PHPMailer 5.2.17
nomisec
WORKING POC
1 stars
by liusec · poc
https://github.com/liusec/WP-CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a remote command execution vulnerability in WordPress <= 4.6 via PHPMailer. It includes a Docker environment for testing and detailed instructions for exploiting the vulnerability through crafted HTTP requests.
Classification
Working Poc 95%
Target:
WordPress <= 4.6
No auth needed
Prerequisites:
Access to the WordPress login page · Ability to send HTTP requests to the target
nomisec
WORKING POC
1 stars
by j4k0m · remote
https://github.com/j4k0m/CVE-2016-10033
The repository contains a functional exploit script for CVE-2016-10033, a command injection vulnerability in PHPMailer. The exploit sends a crafted HTTP request to inject a malicious payload, creating a PHP shell for remote command execution.
Classification
Working Poc 95%
Target:
PHPMailer (versions before 5.2.18)
No auth needed
Prerequisites:
Target server using vulnerable PHPMailer version · Network access to the target
github
WORKING POC
1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2016-10033
This repository contains a functional Perl exploit for CVE-2016-10033, targeting PHPMailer's command injection vulnerability via crafted Sender properties. The exploit sends a malicious payload through the Host header to achieve remote code execution.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target server with vulnerable PHPMailer version · Network access to the target
nomisec
WORKING POC
1 stars
by chipironcin · poc
https://github.com/chipironcin/CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a remote code execution vulnerability in WordPress 4.6. The exploit leverages the Exim4 MTA to execute arbitrary commands via crafted email headers, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
WordPress 4.6
No auth needed
Prerequisites:
Docker · docker-compose · Exim4 MTA installed on the target
github
WORKING POC
1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2016-10033
This repository provides a functional exploit for CVE-2016-10033, a PHPMailer vulnerability allowing remote code execution via crafted email headers. The Dockerfile sets up a vulnerable environment, and the README includes a curl command to trigger the exploit, demonstrating RCE via command injection.
Classification
Working Poc 95%
Target:
PHPMailer (versions before 5.2.18)
No auth needed
Prerequisites:
Docker environment · Vulnerable PHPMailer instance
nomisec
WORKING POC
1 stars
by awidardi · remote
https://github.com/awidardi/opsxcq-cve-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a remote code execution vulnerability in PHPMailer versions before 5.2.18. The exploit leverages improper filtering of special characters in the sender's email address to inject malicious parameters into the mail command, leading to arbitrary code execution.
Classification
Working Poc 100%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target running PHPMailer < 5.2.18 · PHP version < 5.2.0 or no PCRE installed · Safe mode disabled
nomisec
WORKING POC
by cved-sources · poc
https://github.com/cved-sources/cve-2016-10033
This repository provides a Dockerized environment for CVE-2016-10033, a PHPMailer vulnerability that allows remote command execution via crafted email headers. The setup includes a vulnerable PHPMailer instance and a mail form to demonstrate the exploit.
Classification
Working Poc 95%
Target:
PHPMailer 5.2.17
No auth needed
Prerequisites:
Docker environment · Network access to the vulnerable service
nomisec
WORKING POC
by zeeshanbhattined · remote
https://github.com/zeeshanbhattined/exploit-CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a remote code execution vulnerability in PHPMailer versions before 5.2.18. The exploit leverages improper filtering of special characters in the sender's email address to inject malicious parameters into the mail command, leading to arbitrary code execution.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target running PHPMailer < 5.2.18 · PHP version < 5.2.0 or no PCRE installed · safe_mode disabled
nomisec
WORKING POC
by ElnurBDa · remote
https://github.com/ElnurBDa/CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, a PHPMailer vulnerability in WordPress 4.6 that allows remote code execution via crafted Host headers. The exploit uses a bash script to deliver and execute a payload on the target system.
Classification
Working Poc 95%
Target:
WordPress 4.6
No auth needed
Prerequisites:
Target running WordPress 4.6 · Network access to the target · Python3 for serving payload
nomisec
WORKING POC
by sealldeveloper · remote
https://github.com/sealldeveloper/CVE-2016-10033-PoC
This repository contains a functional Python script that exploits CVE-2016-10033, a remote code execution vulnerability in PHPMailer. The exploit leverages a crafted email submission to write a malicious PHP backdoor to the target server, enabling arbitrary command execution.
Classification
Working Poc 95%
Target:
PHPMailer (versions before 5.2.18)
No auth needed
Prerequisites:
Target server running vulnerable PHPMailer version · Network access to the target
nomisec
WORKING POC
by alexander47777 · remote
https://github.com/alexander47777/CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, targeting PHPMailer's improper handling of the `$additional_parameters` argument in the `mail()` function. The exploit injects malicious parameters to write a PHP shell to a web-accessible directory, achieving remote code execution (RCE).
Classification
Working Poc 95%
Target:
PHPMailer ≤ 5.2.17
No auth needed
Prerequisites:
PHP configured to use sendmail · sendmail_path defined and accessible · Target application using vulnerable PHPMailer version
github
WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2016-10033
This repository contains a functional Perl exploit for CVE-2016-10033, targeting PHPMailer's command injection vulnerability via crafted Sender properties. The exploit sends a malicious payload through the Host header to achieve remote code execution.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target server with vulnerable PHPMailer version · Network access to the target
nomisec
WORKING POC
by Astrowmist · poc
https://github.com/Astrowmist/POC-CVE-2016-10033
This repository contains a functional exploit for CVE-2016-10033, targeting PHPMailer, Zend-mail, and SwiftMailer to achieve remote code execution via crafted email payloads. The exploit uploads a PHP backdoor through a vulnerable contact form and establishes a reverse shell.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18, Zend Framework / zend-mail < 2.4.11, SwiftMailer <= 5.4.5-DEV
No auth needed
Prerequisites:
Vulnerable PHPMailer/Zend-mail/SwiftMailer installation · Accessible contact form with default or known field names
nomisec
WORKING POC
by Bajunan · poc
https://github.com/Bajunan/CVE-2016-10033
This is a functional exploit for CVE-2016-10033, a remote code execution vulnerability in WordPress 4.6. The script leverages a flaw in the password reset functionality to inject malicious commands via crafted HTTP headers, ultimately executing a reverse shell.
Classification
Working Poc 95%
Target:
WordPress 4.6
No auth needed
Prerequisites:
Target running WordPress 4.6 · Network access to the target · Attacker-controlled server to host payload and receive reverse shell
exploitdb
WORKING POC
VERIFIED
by Dawid Golunski · bashwebappsphp
https://www.exploit-db.com/exploits/40968
This exploit leverages a file upload vulnerability in PHPMailer (CVE-2016-10033) to upload a malicious PHP backdoor. It then provides a remote shell by encoding commands in base64 and executing them via the backdoor.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target with vulnerable PHPMailer version · Network access to the target
exploitdb
WORKING POC
by phackt_ul · pythonwebappsphp
https://www.exploit-db.com/exploits/42221
This exploit targets PHPMailer, SwiftMailer, and Zend Framework mail libraries to achieve remote code execution via command injection in the email address field. It leverages Exim MTA's expansion mode and base64 encoding to bypass input validation and execute a reverse shell.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.20, SwiftMailer <= 5.4.5-DEV, Zend Framework / zend-mail < 2.4.11
No auth needed
Prerequisites:
Vulnerable PHP mail library · Exim MTA as the mail transfer agent · Access to a contact form or similar input vector
metasploit
WORKING POC
NORMAL
by Dawid Golunski, wvu · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_phpmailer_host_header.rb
This Metasploit module exploits a command injection vulnerability in WordPress 4.6 via a spoofed Host header to PHPMailer, leveraging Exim string expansions for RCE. It requires a valid WordPress username and targets the default virtual host.
Classification
Working Poc 100%
Target:
WordPress 4.6 with Exim MTA
Auth required
Prerequisites:
Valid WordPress username · Exim as MTA · Default virtual host configuration
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/42024
This Metasploit module exploits a command injection vulnerability in WordPress 4.6 via a spoofed Host header to PHPMailer, leveraging Exim's string expansions for remote code execution. It requires a valid WordPress username and targets the default virtual host.
Classification
Working Poc 100%
Target:
WordPress 4.6 with Exim as MTA
Auth required
Prerequisites:
Valid WordPress username · Exim as MTA · Default virtual host configuration
exploitdb
WORKING POC
by Dawid Golunski · pythonwebappsphp
https://www.exploit-db.com/exploits/40986
This exploit targets multiple vulnerabilities in PHPMailer, SwiftMailer, and Zend-mail to achieve remote code execution via a contact form. It uploads a PHP backdoor containing a reverse shell payload to the target server.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.20, SwiftMailer <= 5.4.5-DEV, Zend Framework / zend-mail < 2.4.11
No auth needed
Prerequisites:
Target must have a vulnerable version of PHPMailer, SwiftMailer, or Zend-mail · Target must have a contact form with default or known field names · Attacker must have a listener set up for the reverse shell
exploitdb
WORKING POC
by Dawid Golunski · bashwebappslinux
https://www.exploit-db.com/exploits/41962
This exploit leverages a PHP mail function command injection vulnerability in WordPress 4.6 to achieve remote code execution. It sends a reverse shell payload via a crafted Host header during a password reset request.
Classification
Working Poc 95%
Target:
WordPress 4.6
No auth needed
Prerequisites:
Target must be running WordPress 4.6 · Target must be reachable · Attacker must have network connectivity to the target
exploitdb
WORKING POC
by Dawid Golunski · phpwebappsphp
https://www.exploit-db.com/exploits/40970
This PoC exploits a command injection vulnerability in PHPMailer < 5.2.18 by manipulating the 'From' email address to inject malicious sendmail arguments, leading to arbitrary file write and potential RCE. The exploit writes a PHP payload to a web-accessible directory via sendmail's -X option.
Classification
Working Poc 100%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
PHPMailer < 5.2.18 · Sendmail MTA configured · Ability to send emails through the vulnerable application
exploitdb
WORKING POC
by anarc0der · pythonwebappsphp
https://www.exploit-db.com/exploits/40974
This exploit leverages a vulnerability in PHPMailer (CVE-2016-10033) to achieve remote code execution by injecting a malicious payload into the email field, which writes a PHP backdoor to the target server. The payload establishes a reverse shell connection to the attacker's specified IP and port.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.18
No auth needed
Prerequisites:
Target running vulnerable PHPMailer version · Network access to the target · Attacker-controlled listener for reverse shell
exploitdb
WORKING POC
by Dawid Golunski · bashremotephp
https://www.exploit-db.com/exploits/41996
This exploit leverages CVE-2016-10073 (Header Injection) and CVE-2016-10033 (RCE) in Vanilla Forums <= 2.3 to achieve unauthenticated remote code execution via crafted Host headers in password reset requests.
Classification
Working Poc 100%
Target:
Vanilla Forums <= 2.3
No auth needed
Prerequisites:
Target URL · Attacker-controlled server to host payload · Network access to target
exploitdb
WORKING POC
by Dawid Golunski · pythonwebappsphp
https://www.exploit-db.com/exploits/40969
This exploit leverages a command injection vulnerability in PHPMailer versions < 5.2.20 via the 'email' parameter. It crafts a malicious payload to write arbitrary PHP code to a writable directory, achieving remote code execution.
Classification
Working Poc 95%
Target:
PHPMailer < 5.2.20
No auth needed
Prerequisites:
A writable directory on the target server · A vulnerable PHPMailer version · A contact form or similar input vector