Hi,
I've received a message that there is a security issue with DirectAdmin. I've looked through the forum but can't find an announcement of this (yet). Could someone please shed a light on the following security problem.
The website this was originally found is:
http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html
Excerpt from the blog posting:
DirectAdmin <= v1.33.6 XSS vuln.
###############################################
Vuln. discovered by : r0t
Date: 19 June 2009
vendor:http://www.directadmin.com/
affected versions:v1.33.6 and other
versions also can be affected.
###############################################
DirectAdmin contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "view" parameter in "CMD_REDIRECT" isn't properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
##############################################
live PoC:
http://www.directadmin.com:2222/CMD...script>alert(111);</script>=1&domain=demo.com
PS.
need to login:
demo_user:demo
###############################################
Solution:
Filter malicious characters and character sequences in a web proxy.
###############################################
I've received a message that there is a security issue with DirectAdmin. I've looked through the forum but can't find an announcement of this (yet). Could someone please shed a light on the following security problem.
The website this was originally found is:
http://pridels-team.blogspot.com/2009/06/directadmin-v1336-xss-vuln.html
Excerpt from the blog posting:
DirectAdmin <= v1.33.6 XSS vuln.
###############################################
Vuln. discovered by : r0t
Date: 19 June 2009
vendor:http://www.directadmin.com/
affected versions:v1.33.6 and other
versions also can be affected.
###############################################
DirectAdmin contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "view" parameter in "CMD_REDIRECT" isn't properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
##############################################
live PoC:
http://www.directadmin.com:2222/CMD...script>alert(111);</script>=1&domain=demo.com
PS.
need to login:
demo_user:demo
###############################################
Solution:
Filter malicious characters and character sequences in a web proxy.
###############################################