lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061112230047.4533.qmail@securityfocus.com> Date: 12 Nov 2006 23:00:47 -0000 From: Advisory@...a-security.net To: bugtraq@...urityfocus.com Subject: DirectAdmin Multiple Cross Site Scription #Aria-Security Team Advisory #<www.Aria-security.Com For English > #<www.Aria-Security.net For Persian > #Original Advisory : http://aria-security.net/advisory/directadmin.txt #----------------------------------------------------------- #Software: DirectAdmin V1.28.1 #DirectAdmin level used : Admin level #PoC: http://target:2222/CMD_SHOW_RESELLER?userXSS http://target:2222/CMD_SHOW_USER?user=XSS #DirectAdmin level used : User Level #PoC: http://target:2222/CMD_TICKET_CREATE?TYPE=XSS http://target:2222/CMD_EMAIL_FORWARDER_MODIFY?DOMAIN=demo.com&user=XSS http://target:2222/CMD_TICKET?action=view&number=000000044&type=XSS http://tareget:2222/CMD_EMAIL_VACATION_MODIFY?DOMAIN=demo.com&user=XSS http://target:2222/CMD_EMAIL_LIST?action=view&DOMAIN=demo.com&name=XSS http://target:2222/CMD_FTP_SHOW?DOMAIN=demo.com&user=XSS #DirectAdmin level used : Reseller http://target:2222/CMD_SHOW_USER?user=XSS # #P.S : Attacker must be authenticated # #Contact: Advisory@...a-security.net