This version of WHMCS 7.1.1 NULLED
Items all unlocked to use include:
- Branding Removal
- Project Management Addon
- Licensing Addon
- Mobile Edition if NULLED
- iPhone App if NULLED
- Android App if NULLED
- Configurable Package Addon
- Live Chat Monthly No Branding if NULLED
- License expires on 2050-05-25
- Very simple, in License Key field, you only need put ( whmcs ). After that you can install normally as other scripts.
Version 7.1.1 Release Notes
Release Information
Version: 7.1.1
Release Type: Security
Release Date: 29th December 2016
Distribution Types: Full Version, Incremental and via Automatic Updater
Update/Download
If you are running WHMCS 7.0 or later, you can use the Automatic Update utility. See tutorial
A full download and incremental patch set version can also be downloaded via the Downloads page. See Manual Upgrade Steps
Release Notes
PHPMailer Security Advisory
Exploit type: Remote Code Execution in third-party PHPMailer library
CVE Numbers: CVE-2016-10033 and CVE-2016-10045
Description
All versions of the third-party PHPMailer library distributed with WHMCS are vulnerable to a remote code execution vulnerability. This is patched in PHPMailer 5.2.20.
At this time we do not believe the deficiency in PHPMailer is exposed in WHMCS due to our own validation of user input. Furthermore, the vulnerability requires being able to pass user input unfiltered to a message's "from" address, which in WHMCS is only defined within the admin configuration and only accessible to a trusted admin user.
Irrespective of the known protections in the WHMCS product, this CVE represents a serious issue for PHPMailer. Therefore to mitigate any undiscovered risk or risk to 3rd party extensions using PHPMailer directly, we are releasing updates for all versions of WHMCS in active and long term support to provide the latest PHPMailer library version 5.2.21.
The fix provided by PHPMailer in 5.2.20 for CVE-2016-10045 introduces stricter validation of the sender email address. In most cases, this will not present any problems. However, the fix does break RFC compliance for sender addresses and so more obscure email addresses while technically valid may be rejected by PHPMailer following this change.
Further Reading
- https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
- https://legalhackers.com/advisories...de-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
- https://github.com/PHPMailer/PHPMailer/-Redacted-/master/SECURITY.md
- https://github.com/PHPMailer/PHPMai...2016-10033-and-CVE-2016-10045-vulnerabilities
None
Changelog
Version 7.1.1
Security
- SECURITY-6099 - Update PHPMailer to v5.2.21