This exploit demonstrates an arbitrary file upload vulnerability in PHP Mass Mail 1.0, allowing an attacker to upload a malicious PHP file to the server. The vulnerability arises from improper handling of file uploads in the `send.php` script, which does not validate or restrict the uploaded file type.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:PHP Mass Mail 1.0
No auth needed
Prerequisites:Access to the target web application · Ability to send HTTP POST requests