2017-02-16, 20:10
(2017-02-16, 20:08)Martijn Wrote: Here's the code
https://github.com/xbmc/xbmc
Patches welcome
<3
(2017-02-16, 20:08)Martijn Wrote: Here's the code
https://github.com/xbmc/xbmc
Patches welcome
(2017-02-17, 21:20)stefansaraev Wrote:(2017-02-17, 21:05)Memphiz Wrote: The second exploit (fetching /etc/passwd) only works because kodi runs as user root which is a really bad idea - just mentioning it ...
you know you are wrong..
(2017-02-18, 12:07)Memphiz Wrote:(2017-02-17, 21:20)stefansaraev Wrote:(2017-02-17, 21:05)Memphiz Wrote: The second exploit (fetching /etc/passwd) only works because kodi runs as user root which is a really bad idea - just mentioning it ...
you know you are wrong..
No i don't else i wouldn't have posted. Where is my error?
Quote:What is the SSH login?(http://wiki.openelec.tv/index.php/OpenEL...use_SSH.3F)
Shortcut: #SSH Login
Currently the login into OpenELEC has fixed settings.
Login: root
Password: openelec
Note that these values are case-sensitive.
(2017-02-18, 11:13)Montellese Wrote: How do you execute bash commands? The webserver itself doesn't support that. If it's possible through JSON-RPC and Input.ExecuteAction that would be a problem with builtins.fritsch mentioned something about requesting an image via JSON-RPC and adding a pipe at the end to execute another command. He asked if someone running LE could test a certain request, so I assumed he wanted to give one of the mentioned exploits a try