Chuggnutt HTML to Text Converter Remote Code Execution Exploit

This module exploits a Chuggnutt HTML to Text Converter preg_replace using eval switch in multiple web applications in order to install an agent. Currently, this module supports AtMail Open and RoundCube Webmail.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2008-5619
Released Date: 
Tuesday, August 10, 2010 - 19:00