Created
August 12, 2021 19:23
-
-
Save johnkegd/62d0773958a870804c555933d5e06034 to your computer and use it in GitHub Desktop.
Exploring vulnerability from Upc router ConnectBox DCHP admin page login
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /** | |
| * Exploring Upc Connect Box admin conection vulnerability | |
| * file: base.js | |
| * line: 1026 | |
| * @params: | |
| * {@String loginCSRMode} userData.loginCSRMode = "1" | |
| * {@String UserName} userData.UserName = "upccsr" | |
| */ | |
| function getUserData(userData, callback) { | |
| var data; | |
| userData_json = JSON.stringify(userData); | |
| $.ajax({ | |
| type: "POST", | |
| url: "php/user_data.php", | |
| data: { userData: userData_json, | |
| opType: "READ" }, | |
| dataType: "json", | |
| success: function(msg) { | |
| data = msg; | |
| if(callback) { callback(data); } | |
| }, | |
| async:false, | |
| cache:false, | |
| error: function(){ | |
| console.log("Falied to get user data"); | |
| } | |
| }); | |
| return data; | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment