CVE-2019-9053.# CVE-2019-9053 Exploit - Python 3
This is a Python 3 port of the CVE-2019-9053 exploit, which targets CMS Made Simple (CMSMS) versions before 2.2.10. The vulnerability allows for SQL injection through the News module interface.
## Example Output
Tested on the [TryHackMe Simple CTF Challenge](https://tryhackme.com/room/easyctf).

## Description
The exploit takes advantage of a SQL injection vulnerability in the CMS Made Simple News module. It can:
- Extract the CMS salt
- Dump admin username
- Dump admin email
- Dump admin password hash
- Optionally crack the password using a provided wordlist
## Quick Start
Download and run quickly using these commands:
```bash
# Download the exploit
curl -O https://raw.githubusercontent.com/del0x3/CVE-2019-9053-port-py3/main/exploit.py
# Download requirements
curl -O https://raw.githubusercontent.com/del0x3/CVE-2019-9053-port-py3/main/requirements.txt
# Install requirements
pip install -r requirements.txt
# Make exploit executable
chmod +x exploit.py
# Run the exploit
./exploit.py -u http://target.com/cms
```
Alternative using wget:
```bash
wget https://raw.githubusercontent.com/del0x3/CVE-2019-9053-port-py3/main/exploit.py
wget https://raw.githubusercontent.com/del0x3/CVE-2019-9053-port-py3/main/requirements.txt
pip install -r requirements.txt
chmod +x exploit.py
./exploit.py -u http://target.com/cms
```
## Requirements
- Python 3.6+
- Required packages (see requirements.txt)
## Installation
1. Clone this repository:
```bash
git clone https://github.com/del0x3/CVE-2019-9053-port-py3.git
cd CVE-2019-9053-port-py3
```
2. Install the required packages:
```bash
pip install -r requirements.txt
```
## Usage
Basic usage:
```bash
python3 exploit.py -u http://target.com/cms
```
With password cracking:
```bash
python3 exploit.py -u http://target.com/cms -c -w /path/to/wordlist.txt
```
### Arguments
- `-u, --url`: Base target URL (required)
- `-w, --wordlist`: Path to wordlist for password cracking
- `-c, --crack`: Enable password cracking mode
## Disclaimer
This tool is for educational and security research purposes only. Do not use it against systems without explicit permission.
## Credits
- Original exploit by Daniele Scanu
- Python 3 port by Del0x3
## License
MIT License
[4.0K] /data/pocs/47182d7021632cc371e7ec3f97b4533ab9766353
├── [3.4K] exploit.py
├── [4.0K] images
│ └── [ 17K] image.png
├── [ 129] __init__.py
├── [1.0K] LICENSE
├── [2.2K] README.md
└── [ 34] requirements.txt
1 directory, 6 files