http

package
v0.5.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 9, 2026 License: AGPL-3.0 Imports: 2 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type AVideoEncoderGetImageCmdInject added in v0.5.0

type AVideoEncoderGetImageCmdInject struct{ sdk.Pik }

AVideoEncoderGetImageCmdInject exploits CVE-2026-29058: unauthenticated OS command injection in AVideo Encoder's getImage.php. The base64Url parameter is base64-decoded and passed through FILTER_VALIDATE_URL, then interpolated directly into an ffmpeg shell command within double quotes without escapeshellarg(). Backticks in the URL path achieve command substitution.

func (*AVideoEncoderGetImageCmdInject) Check added in v0.5.0

func (*AVideoEncoderGetImageCmdInject) Exploit added in v0.5.0

func (*AVideoEncoderGetImageCmdInject) Info added in v0.5.0

type Langflow

type Langflow struct{ sdk.Pik }

Langflow exploits pre-auth RCE in Langflow's /api/v1/validate/code endpoint. Python exec via decorator injection (CVE-2025-3248).

func (*Langflow) Check

func (m *Langflow) Check(run *sdk.Context) (sdk.CheckResult, error)

func (*Langflow) Exploit

func (m *Langflow) Exploit(run *sdk.Context) error

func (*Langflow) Info

func (m *Langflow) Info() sdk.Info

type MajorDoMoCmdInject added in v0.5.0

type MajorDoMoCmdInject struct{ sdk.Pik }

MajorDoMoCmdInject exploits CVE-2023-50917: command injection in MajorDoMo's thumb.php via the transport parameter.

func (*MajorDoMoCmdInject) Check added in v0.5.0

func (m *MajorDoMoCmdInject) Check(run *sdk.Context) (sdk.CheckResult, error)

func (*MajorDoMoCmdInject) Exploit added in v0.5.0

func (m *MajorDoMoCmdInject) Exploit(run *sdk.Context) error

func (*MajorDoMoCmdInject) Info added in v0.5.0

func (m *MajorDoMoCmdInject) Info() sdk.Info

type MajorDoMoCycleExecs added in v0.5.0

type MajorDoMoCycleExecs struct{ sdk.Pik }

MajorDoMoCycleExecs exploits CVE-2026-27175: unauthenticated command injection via MajorDoMo's rc/index.php. The param parameter is interpolated into double quotes without escapeshellarg() and inserted into the safe_execs table. The cycle_execs.php worker (started by MajorDoMo's cycle.php on boot) polls this table every second and passes each entry to execInBackground().

func (*MajorDoMoCycleExecs) Check added in v0.5.0

func (m *MajorDoMoCycleExecs) Check(run *sdk.Context) (sdk.CheckResult, error)

Check verifies the rc handler is accessible without authentication. Intentionally avoids sending a command parameter to prevent inserting entries into safe_execs during readiness probing.

func (*MajorDoMoCycleExecs) Exploit added in v0.5.0

func (m *MajorDoMoCycleExecs) Exploit(run *sdk.Context) error

Exploit injects the payload via rc/index.php's param field. The cycle_execs.php worker polls safe_execs every second and executes it.

func (*MajorDoMoCycleExecs) Info added in v0.5.0

func (m *MajorDoMoCycleExecs) Info() sdk.Info

type OpenDCIM

type OpenDCIM struct{ sdk.Pik }

OpenDCIM exploits SQL injection in openDCIM's install.php LDAP config update to achieve RCE via dot binary path poisoning (CVE-2026-28515/28516/28517).

func (*OpenDCIM) Check

func (m *OpenDCIM) Check(run *sdk.Context) (sdk.CheckResult, error)

Check probes install.php accessibility and confirms SQLi via time-based test.

func (*OpenDCIM) ExecuteCommand

func (m *OpenDCIM) ExecuteCommand(run *sdk.Context, cmd string) error

ExecuteCommand injects a command via SQLi into the dot binary path and triggers it.

func (*OpenDCIM) Exploit

func (m *OpenDCIM) Exploit(run *sdk.Context) error

Exploit chains SQLi to RCE. Handles both single-shot payloads and CmdStager chunked delivery. Backs up config before, restores after.

func (*OpenDCIM) Info

func (m *OpenDCIM) Info() sdk.Info

type SpringCloudFunc

type SpringCloudFunc struct{ sdk.Pik }

SpringCloudFunc exploits SpEL injection in Spring Cloud Function's routing-expression header (CVE-2022-22963).

func (*SpringCloudFunc) Check

func (m *SpringCloudFunc) Check(run *sdk.Context) (sdk.CheckResult, error)

func (*SpringCloudFunc) Exploit

func (m *SpringCloudFunc) Exploit(run *sdk.Context) error

func (*SpringCloudFunc) Info

func (m *SpringCloudFunc) Info() sdk.Info

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL