============================================================================= [+] Exploit Title : DirectAdmin Web Control Panel CSRF/XSS vulnerability [+] Exploit Author : Ashiyane Digital Security Team [+] Date : 1.483 [+] Version : 2015/09/08 [+] Tested on : Elementary Os [+] Vendor Homepage : http://www.directadmin.com/ ============================================================================= [+] Introduction : DirectAdmin is a graphical web-based web hosting control panel designed to make administration of websites easier. DirectAdmin suffers from cross site request forgery and cross site scripting vulnerabilities ============================================================================= [+] CMD_FILE_MANAGER : [+] Users : Users are web hosting clients. They use DirectAdmin to configure their web site [+] Exploit 1: Create New File and Edit a file
----------------------------------------------------------------------------- [+] Exploit 2: Create a New Folder
----------------------------------------------------------------------------- [+] Exploit 3: Rename a file
----------------------------------------------------------------------------- [+] Exploit 4 : Reflected XSS
============================================================================= [+] CMD_FTP : [+] Users : Users are web hosting clients. They use DirectAdmin to configure their web site [+] Exploit : Create FTP account
============================================================================= [+] CMD_DB : [+] Users : Users are web hosting clients. They use DirectAdmin to configure their web site [+] Exploit : Create new Database
============================================================================= [+] CMD_DB : [+] Users : Users are web hosting clients. They use DirectAdmin to configure their web site [+] Exploit : Create new E-Mail Forwarder
============================================================================= [+] Discovered By : Ehsan Hosseini (hehsan979@gmail.com)