Ywa
Verified User
Hi everyone,
I tested this on several public DirectAdmin hosts. This exploit worked on all of them.
Possibilities with exploit
How does this exploit work
1. Retrieve a domainname on your host (which you don't got in your account) (ex: mydomainname.com)
2. Create a new domainname in your account: yougothacked.mydomainname.com
3. Wait till the DNS is updated. Visit http://yougothacked.mydomainname.com (this is an example) and it'll forward to your account instead of the legitimate owner's account.
I know this is a normal feature. But on public hosts it can be abused since DA doesn't check if you own the original domain name on the host.
This can be even more abused by creating ftp.mydomainname.com (intercept FTP transactions) and mail.mydomainname.com (read outgoing mails) etc. etc.
Another possibility is to override existing subdomains, although I need to test that more.
I'm sure I'm not the first to find out. But it can be abused!!
- Ywa
Fix: http://www.directadmin.com/features.php?id=925 (this is disabled on default!)
I tested this on several public DirectAdmin hosts. This exploit worked on all of them.
Possibilities with exploit
- Read outgoing mails on random domainnames
- Capture passwords
- Fake/override subdomains
How does this exploit work
1. Retrieve a domainname on your host (which you don't got in your account) (ex: mydomainname.com)
2. Create a new domainname in your account: yougothacked.mydomainname.com
3. Wait till the DNS is updated. Visit http://yougothacked.mydomainname.com (this is an example) and it'll forward to your account instead of the legitimate owner's account.
I know this is a normal feature. But on public hosts it can be abused since DA doesn't check if you own the original domain name on the host.
This can be even more abused by creating ftp.mydomainname.com (intercept FTP transactions) and mail.mydomainname.com (read outgoing mails) etc. etc.
Another possibility is to override existing subdomains, although I need to test that more.
I'm sure I'm not the first to find out. But it can be abused!!
- Ywa
Fix: http://www.directadmin.com/features.php?id=925 (this is disabled on default!)
Last edited: