Advertisement
xGHOSTSECx

worldbank.org working exploit

Aug 4th, 2021
1,004
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.86 KB | None | 0 0
  1. [+] Vulnerable component: jquery v2.2.4
  2. [!] Component location: http://www.worldbank.org/etc.clientlibs/worldbankgroup/clientlibs/vendor/jquery.js
  3. [!] Total vulnerabilities: 3
  4. [!] Summary: parseHTML() executes scripts in event handlers
  5. [!] Severity: medium
  6. [!] CVE: CVE-2015-9251
  7. [!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
  8. [!] Severity: low
  9. [!] CVE: CVE-2019-11358
  10. [!] Summary: 3rd party CORS request may execute
  11. [!] Severity: medium
  12. [!] CVE: CVE-2015-9251
  13. ------------------------------------------------------------
  14. [+] Potentially vulnerable objects found at http://www.worldbank.org
  15. ------------------------------------------------------------
  16. 6 document.cookie = cname + "=" + cvalue + "; " + expiration;
  17. 3 var consent_note = document.cookie.replace(/(?:(?:^|.*;\s*)consent_cookie\s*\=\s*([^;]*).*$)|^.*$/, '$1');
  18. 6 var url = window.location.href;
  19. 7 window.location = $(this).closest(".search_code_at_the_end").attr("action")+qterm;
  20. 7 window.location = $(this).closest(".search_code_at_the_end").attr("action")+qterm;
  21. 7 document.getElementById("footer-year").innerHTML = year;
  22. 3 function b(a){c[a]=function(){var b=arguments;c.queue.push(function(){c[a].apply(c,b)})}}var c={config:a},d=document,e=window;setTimeout(function(){var b=d.createElement("script");b.src=a.url||"https://az416426.vo.msecnd.net/scripts/a/ai.0.js",d.getElementsByTagName("script")[0].parentNode.appendChild(b)});try{c.cookie=d.cookie}catch(a){}c.queue=[];for(var f=["Event","Exception","Metric","PageView","Trace","Dependency"];f.length;)b("track"+f.pop());if(b("setAuthenticatedUserContext"),b("clearAuthenticatedUserContext"),b("startTrackEvent"),b("stopTrackEvent"),b("startTrackPage"),b("stopTrackPage"),b("flush"),!a.disableExceptionTracking){f="onerror",b("_"+f);var g=e[f];e[f]=function(a,b,d,e,h){var i=g&&g(a,b,d,e,h);return!0!==i&&c["_"+f](a,b,d,e,h),i}}return c
  23. 3 function b(a){c[a]=function(){var b=arguments;c.queue.push(function(){c[a].apply(c,b)})}}var c={config:a},d=document,e=window;setTimeout(function(){var b=d.createElement("script");b.src=a.url||"https://az416426.vo.msecnd.net/scripts/a/ai.0.js",d.getElementsByTagName("script")[0].parentNode.appendChild(b)});try{c.cookie=d.cookie}catch(a){}c.queue=[];for(var f=["Event","Exception","Metric","PageView","Trace","Dependency"];f.length;)b("track"+f.pop());if(b("setAuthenticatedUserContext"),b("clearAuthenticatedUserContext"),b("startTrackEvent"),b("stopTrackEvent"),b("startTrackPage"),b("stopTrackPage"),b("flush"),!a.disableExceptionTracking){f="onerror",b("_"+f);var g=e[f];e[f]=function(a,b,d,e,h){var i=g&&g(a,b,d,e,h);return!0!==i&&c["_"+f](a,b,d,e,h),i}}return c
  24. 4 var query_string = window.location.search;
  25. 62 "pageUrl":(document.URL).replace("https://","").replace("http://",""),
  26.  
  27. Leaked By GhostSec
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement