Removed `username:password@` portion of example target URLs as
unfortunately this triggers warnings in most modern browsers. The
modules target CSRF vulnerabilities and it's expected and
acceptable behaviour to rely on the user having an authorized session by
default.
"Advanced users" will be familiar with the `username:password@` trick
and can add it to the URL if they desire.
routers to it.
This fixes issue 413
A modules/router
AM + modules/router/linksys_befsr41_csrf
M modules/router/linksys_befsr41_csrf/config.yaml
AM + modules/router/linksys_wrt54g_csrf
M modules/router/linksys_wrt54g_csrf/config.yaml
AM + modules/router/linksys_wrt54g2_csrf
M modules/router/linksys_wrt54g2_csrf/config.yaml
D modules/network/linksys_befsr41_csrf
D modules/network/linksys_wrt54g_csrf
D modules/network/linksys_wrt54g2_csrf
git-svn-id: https://beef.googlecode.com/svn/trunk@1137 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9