Is this fixed yet ?, I see a flurry of really nasty hacks in mind by abusing the directadmin_cron job with this..
--------------
http://secunia.com/advisories/24551/
TITLE:
DirectAdmin "RESULT" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID:
SA24551
VERIFY ADVISORY:
http://secunia.com/advisories/24551/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
DirectAdmin 1.x
http://secunia.com/product/9646/
DESCRIPTION:
Mandr4ke has reported a vulnerability in DirectAdmin, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Input passed to the "RESULT" parameter in CMD_USER_STATS is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
SOLUTION:
Filter malicious characters and character sequences in a web proxy.
PROVIDED AND/OR DISCOVERED BY:
Mandr4ke
----------------------------------------------------------------------
--------------
http://secunia.com/advisories/24551/
TITLE:
DirectAdmin "RESULT" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID:
SA24551
VERIFY ADVISORY:
http://secunia.com/advisories/24551/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
DirectAdmin 1.x
http://secunia.com/product/9646/
DESCRIPTION:
Mandr4ke has reported a vulnerability in DirectAdmin, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
Input passed to the "RESULT" parameter in CMD_USER_STATS is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
SOLUTION:
Filter malicious characters and character sequences in a web proxy.
PROVIDED AND/OR DISCOVERED BY:
Mandr4ke
----------------------------------------------------------------------