##################################################### ## ## << Multiple cross site script >> ## ## C P A N E L 1 0 ## ## Preth00nker [at] gmail [dot] com ## BY PRETH00NKER ## http://mexhackteam.org ## ## special dedication for my friends of: ## <> ## ## ###################################################### [ introduction ] Preth00nker was discovering some news vulnerabilities in cpanel 10. Cite: cPanel allows domain owners to manage and monitor their web site. This easy to use interface is packed full of useful features. Inside cPanel, domain owners can control their web site to a degree which was never before possible. cPanel gives domain owners a flexibility beyond that of the competition. Refer:http://www.cpanel.net/products/cPanelandWHM/linux/cpanelov.htm [ Explanations: ] Exploit #1: http://[Target:port]/frontend/x/htaccess/dohtaccess.html?dir=>[Your Code here] Condition's labels: just a ! > ! next the script. In first case we can see that an error happen in the $dir variable inside 'dohtaccess.html' file; When the applications can't find the folder that you request the script print next code in the checkbox //------------ Start ------------------- [Your Code here] Condition's labels: just a ! "> ! next the script. every time the script is printing something like this //------------ Start ------------------- Save file as: \\------------- EOF -------------------- in this case, too we can see that the $file variable inside 'editit.html' file is not filtrated of a secure way, just is necessary that close the textarea for that an attacker can insert a script into the page. Exploit #3: http://[Target:port]/frontend/x/files/showfile.html?dir=/&file=[Your Code here] Condition's labels: without !