компьютерный форум
Вернуться   Компьютерный форум > IT новости > Новости IT индустрии > Security news (безопасность)

Ответ
 
LinkBack Опции темы Опции просмотра
Старый 05.02.2006, 08:31   #1
PRO-двинутые пользователи
 
Регистрация: 06.04.2004
Сообщений: 3,788
По умолчанию

В CPanel обнаружено несколько уязвимостей. Залогиненый пользователь может выполнить произвольный скрипт.

Цитата:
Title: cPanel Multiple Cross Site Scripting

Author: Simo Ben youssef aka _6mO_HaCk <simo_at_morx_org>
Discovered: 22 january 2005
Published: 02 february 2006
MorX Security Research Team
http://www.morx.org

Service: Web Hosting Manager

Vendor: cPanel

Vulnerability: Cross Site Scripting / Cookie-Theft / Relogin attacks

Severity: Medium/High

Details:

cPanel (control panel) is a graphical web-based management tool, designed to make administration of web sites
as easy as possible. cPanel handles all aspects of website administration in an easy-to-use interface.
The software, which is proprietary, runs on a number of popular RPM-based Linux distributions, such as SuSE, Fedora,
Mandriva, CentOS, Red Hat Enterprise Linux, and cAos, as well as FreeBSD. cPanel is commonly accessed on ports 2082
and 2083 (for a SSL version). Authentication is either via HTTP or web page login. cPanel is prone to cross-site
scripting attacks. This problem is due to a failure in the application to properly sanitize user-supplied input



Impact:

an attacker can exploit the vulnerable scripts to have arbitrary script code executed in the browser of an authentified
cPanel user in the context of the website hosting the vulnerable cPanel version. resulting in the theft of cookie-based
authentication giving the attacker full access to the victim's cPanel account as well as other type of attacks.


Affected scripts with proof of concept exploit:

http://www.vulnerable-site.com:2082/fronte...ipt>&domain=

http://www.vulnerable-site.com:2082/fronte...>&domain=xxx

http://www.vulnerable-site.com:2082/fronte...</script>

http://www.vulnerable-site.com:2082/fronte...</script>

http://www.vulnerable-site.com:2082/fronte...>&target=xxx

http://www.vulnerable-site.com:2082/fronte...=xxx&target=xxx

http://www.vulnerable-site.com:2082/fronte...=xxx&target=xxx


Disclaimer:

this entire document is for eductional, testing and demonstrating purpose only. Modification use and/or publishing this
information is entirely on your OWN risk. The information provided in this advisory is to be used/tested on your OWN
machine/Account. I cannot be held responsible for any of the above.
Полная информация - http://www.morx.org/cpanelXSS.txt

Все владельцы сайтов у кого цпанель уже погнал тестить своих хостеров




Imperio вне форума  
Digg this Post!Bookmark Post in Technorati
Ответить с цитированием
05.02.2006, 08:31
Техник
реклама
По умолчанию

Ответ


Опции темы
Опции просмотра

Ваши права в разделе
Вы не можете создавать новые темы
Вы не можете отвечать в темах
Вы не можете прикреплять вложения
Вы не можете редактировать свои сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.
Trackbacks are Вкл.
Pingbacks are Вкл.
Refbacks are Вкл.



Текущее время: 20:35. Часовой пояс GMT.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd. Перевод: zCarot
Content Relevant URLs by vBSEO 3.5.0 RC2