This repository was created to simplify the SWF-based JSON CSRF exploitation
The .swf file take 3 parameters:
- jsonData - apparently, JSON Data:)
- php_url - URL of the 307 redirector php file.
- endpoint - target endpoint, which is vulnerable to CSRF.
Place test.swf, test.php and crossdomain.xml on your host, then simply call the SWF file with the correct parameters.
Special thanks to the https://twitter.com/emgeekboy, who inspired me to make this repository. Related blog posts about this: