WHMCS
WHMCS
afc04426a1afe17a2a00286d0669aae6.png


This version of WHMCS 7.1.1 NULLED


Items all unlocked to use include:



      • Branding Removal
      • Project Management Addon
      • Licensing Addon
      • Mobile Edition if NULLED
      • iPhone App if NULLED
      • Android App if NULLED
      • Configurable Package Addon
      • Live Chat Monthly No Branding if NULLED
      • License expires on 2050-05-25
How to install it ?
- Very simple, in License Key field, you only need put ( whmcs ). After that you can install normally as other scripts.


Version 7.1.1 Release Notes
Release Information
Version: 7.1.1
Release Type: Security
Release Date: 29th December 2016
Distribution Types: Full Version, Incremental and via Automatic Updater

Update/Download
If you are running WHMCS 7.0 or later, you can use the Automatic Update utility. See tutorial

A full download and incremental patch set version can also be downloaded via the Downloads page. See Manual Upgrade Steps

Release Notes
PHPMailer Security Advisory
Exploit type: Remote Code Execution in third-party PHPMailer library
CVE Numbers: CVE-2016-10033 and CVE-2016-10045

Description
All versions of the third-party PHPMailer library distributed with WHMCS are vulnerable to a remote code execution vulnerability. This is patched in PHPMailer 5.2.20.

At this time we do not believe the deficiency in PHPMailer is exposed in WHMCS due to our own validation of user input. Furthermore, the vulnerability requires being able to pass user input unfiltered to a message's "from" address, which in WHMCS is only defined within the admin configuration and only accessible to a trusted admin user.

Irrespective of the known protections in the WHMCS product, this CVE represents a serious issue for PHPMailer. Therefore to mitigate any undiscovered risk or risk to 3rd party extensions using PHPMailer directly, we are releasing updates for all versions of WHMCS in active and long term support to provide the latest PHPMailer library version 5.2.21.

The fix provided by PHPMailer in 5.2.20 for CVE-2016-10045 introduces stricter validation of the sender email address. In most cases, this will not present any problems. However, the fix does break RFC compliance for sender addresses and so more obscure email addresses while technically valid may be rejected by PHPMailer following this change.

Further Reading
  1. https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
  2. https://legalhackers.com/advisories...de-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
  3. https://github.com/PHPMailer/PHPMailer/-Redacted-/master/SECURITY.md
  4. https://github.com/PHPMailer/PHPMai...2016-10033-and-CVE-2016-10045-vulnerabilities
Template Changes
None

Changelog
Version 7.1.1
Security
  • SECURITY-6099 - Update PHPMailer to v5.2.21

Latest reviews

has been patched.
Bro, thanks so much for this. I have been waiting for YEARS for it.
MalerWanne
MalerWanne
No PRoblem
Thank you
MalerWanne
MalerWanne
No Problem

Similar resources

Cloudflare's Official WHMCS Plugin K
0.00 star(s) 0 ratings
Downloads
67
Updated
Dedicated Server Reseller for WHMCS K
0.00 star(s) 0 ratings
Downloads
74
Updated
Dropmysite WHMCS Addon Module for cPanel K
0.00 star(s) 0 ratings
Downloads
21
Updated
BlackSpigot General Chat
Rules Help Users
    trickyyy @ trickyyy: Hey :Minecraft:
    Top