exploit-db-mirror/exploits/windows/webapps/12750.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

11 lines
No EOL
630 B
Text

RapidWareX v2.0.1 (WebUI) CSRF Exploit
Author: l3D
Sites: http://xraysecurity.blogspot.com, http://nullbyte.org.il
IRC: irc://irc.nix.co.il
Email: pupipup33@gmail.com
RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc. Please note that in order to carry out the attack, the victim must have RapidWareX running and logged in.
The example below clears all the downloads when the victim enters the page.
<img src="http://localhost:8080/ClearAll" />