This exploit targets a command injection vulnerability in PHP-Fusion's class.phpmailer.php via the 'sendmail' parameter. The PoC demonstrates arbitrary command execution by injecting 'id' into the URL, leveraging the vulnerable popen() function.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:PHP-Fusion (all versions)
No auth needed
Prerequisites:Access to the target's /includes/class.phpmailer.php endpoint