11 lines
No EOL
630 B
Text
11 lines
No EOL
630 B
Text
RapidWareX v2.0.1 (WebUI) CSRF Exploit
|
|
Author: l3D
|
|
Sites: http://xraysecurity.blogspot.com, http://nullbyte.org.il
|
|
IRC: irc://irc.nix.co.il
|
|
Email: pupipup33@gmail.com
|
|
|
|
RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc. Please note that in order to carry out the attack, the victim must have RapidWareX running and logged in.
|
|
|
|
The example below clears all the downloads when the victim enters the page.
|
|
|
|
<img src="http://localhost:8080/ClearAll" /> |