C-Panel dir.html Cross Site Scripting

2012.12.28
Credit: Rafay Baloch
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Details ============= Product: Cpanel Security-Risk: High Remote-Exploit: yes Vendor-URL: http://www.cpanel.net Advisory-Status: NotPublished Credits ============= Discovered by: Rafay Baloch of RafayHackingArticles(RHA) Affected Products: ============= Cpanel's Latest Version Description ============= "Simple website management." More Details ============= I have discsovered a non persistent Cross site scripting (XSS) inside Cpanel, the vulnerability can be easily exploited and can be used to steal cookies, perform phishing attacks and other various attacks compromising the security of a user. Proof of Concept ============= Log into your CPanel accoutn and navigate to the following link: https://gator1347.hostgator.com:2083/frontend/x3/files/dir.html?showhidden=1&dir= Now insert your xss payload inside Dir parameter. Exploit ============= https://localhost/frontend/x3/files/dir.html?showhidden=1&dir=%3Cimg%20src=x%20onerror=prompt%280%29;%3E Solution ============= Edit the source code to ensure that input is properly sanitized.

References:

http://www.cpanel.net


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top