Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/unai-d/lliurex-epoptes-exploit
Single Python file that exploits a LliureX's Epoptes vulnerability in order to gain access to any computer.
https://github.com/unai-d/lliurex-epoptes-exploit
exploit lliurex vulnerability
Last synced: 24 days ago
JSON representation
Single Python file that exploits a LliureX's Epoptes vulnerability in order to gain access to any computer.
- Host: GitHub
- URL: https://github.com/unai-d/lliurex-epoptes-exploit
- Owner: unai-d
- Created: 2021-03-03T20:23:34.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2021-03-12T11:21:30.000Z (almost 4 years ago)
- Last Synced: 2024-11-12T20:11:55.374Z (3 months ago)
- Topics: exploit, lliurex, vulnerability
- Language: Python
- Homepage:
- Size: 3.91 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# lliurex-epoptes-exploit
This repository contains a Python file that takes advantage of a vulnerability present on the Epoptes login window in order to gain access to the Epoptes main window without an admin account.
This only works on the Epoptes version used in the [LliureX](https://en.wikipedia.org/wiki/LliureX) operating system.The exploit works because of how the authentication system is designed on the LliureX's Epoptes launcher.
Once the user name and password is ready, the Epoptes launcher will tell to the server to check if the data is correct.
If everything is correct, the same Python file that opened the Epoptes launcher will open the Epoptes main window.
This is done by instantiating a new `EpoptesGui` class, then setting the user name and password on two fields from the class, and finally executing Epoptes.The problem is, whatever user name and/or password you type in, the `EpoptesGui` class will launch the Epoptes main window no matter what. The server will do anything the user orders from that point without checking if the authentication data is valid or not.
## This exploit works on...
- LliureX Server 19.07 (19.200727)
- LliureX Client 16.07 (16.200216)
- LliureX Server 16.07 (16.191025)
- LliureX Client 16.07 (16.180723)
- LliureX Client 16.06 (16.180420)