RapidWareX v2.0.1 (WebUI) CSRF Exploit

ID 1337DAY-ID-12406
Type zdt
Reporter l3D
Modified 2010-05-26T00:00:00


Exploit for windows platform in category web applications

RapidWareX v2.0.1 (WebUI) CSRF Exploit

RapidWareX v2.0.1 (WebUI) CSRF Exploit
Author: l3D
Sites: http://xraysecurity.blogspot.com, http://nullbyte.org.il
IRC: irc://irc.nix.co.il
Email: [email protected]
RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc.  Please note that in order to carry out the attack, the victim must have RapidWareX running and logged in.
The example below clears all the downloads when the victim enters the page.
<img src="http://localhost:8080/ClearAll" />

#  0day.today [2018-03-19]  #