The exploit demonstrates multiple vulnerabilities in Log1 CMS 2.0, including arbitrary file renaming and sensitive information disclosure via 'config.php'. It uses Perl to automate the attack, fetching admin credentials and triggering a DoS condition.
Classification
Working Poc 95%
Attack Type
Info Leak | Dos
Complexity
Trivial
Reliability
Reliable
Target:Log1 CMS 2.0
No auth needed
Prerequisites:Target running Log1 CMS 2.0 · Network access to the web application