Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10033 PoC — PHPMailer 安全漏洞

Source
Associated Vulnerability
Title:PHPMailer 安全漏洞 (CVE-2016-10033)
Description:The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Description
CTF based around CVE-2016-10033
Readme
# CTF_CVE-2016-10033
CTF based around CVE-2016-10033\
By: Evan Brooks\
Ohio University CS4900 

## Description
You are the founder of a new email service called Bobcats Send Mail Over the Internet™. You hoped to make a lot of money from this product, but no one wants to use your mailing service. After doing tons of research you found that the reason is customers prefer using a service called Vulnerable Mail Form™. Vulnerable Mail Form has a minimalistic, easy-to-understand design. You have a plan to get customers using your mail service: disable the competetor's website and embarrass them in the process.

## Setup
This CTF utilizes a docker image from docker user *Vulnerables*. The image provides a site that utilizes a vulnerable version of PHPMailer, which will be run on localhost:8080. Follow the instructions [here](https://hub.docker.com/r/vulnerables/cve-2016-7434) to get the image setup.

## Goals
-Disable the competing mail service running on localhost:8080 using the vulnerability revealed in CVE-2016-10033\
-Leave a message to embarrass your adversaries\
\
Show your localhost:8080 to one of the CTF staff when complete.

## Solution
My solution to this CTF, *deface.sh*, is given in the repository. This shell script begins by choosing a base64 decoder, then begins the exploit. The script creates a backdoor, *backdoor.php*, in the target system. It then connects to this backdoor and replaces the form on the site with the word "Defaced". This prevents the site from being used any more.
File Snapshot

[4.0K] /data/pocs/72e0a642292beb31f2cfb23ef3e0aac0509bf30d ├── [1.9K] deface.sh └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →