[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to respond to any support ticket on the system.
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in that it allows an attacker to respond to any support ticket on the system.
- From: "Zackarin Smitz" <zackerius12@xxxxxxxxxxxxx>
- Date: Mon, 06 Jun 2005 14:00:52 +0800
Subject:
Lpanel.NET's Lpanel (all versions up to and including 1.59) is vulnerable in
that it allows an attacker to respond to any support ticket on the system.
Severity:
Average; Depending upon how the attacker exploits this, this vulnerability
could be extremely severe, but for the most part is average, and can only cause
frustration and confusion among the support department.
Preamble:
(Taken from http://www.lpanel.net/)
Lpanel is a Complete Web Hosting Billing & Automation Suite that installs over
cPanel, WHM.
Created from the ground up from cPanel by web hosting administrators, Lpanel
has everything a cPanel hosting business needs and will ever need. Constantly
expanding to meet the quickly developing web hosting market, Lpanel is the only
complete management solution available today for cPanel web hosts. From
multi-staff tiers, automated signups, reseller management, network utilities,
automated SSL, as well as a full array of ?Added Services? and detailed
efficiency reports - Lpanel is always steps ahead of the rest.
Problem:
The file view_ticket.php displays a form to the user, that allows responses to
be posted to tickets. However the ?pid? POST variable is not authenticated
against the current session after being posted. As such, an attacker could
modify the form displayed by this file (i.e.
http://yourdomain.com/lpanel/help/view_ticket.php?pid=50), and merely change
the action attribute of the form element to a full URI, and also change the
support ticket ID represented by the ?pid? POST variable to the support ticket
the attacker wishes to respond to. The attacker must have an unprivileged user
account on the system. Once the form has been modified, a simple post will
render a response to the support ticket specified by ?pid?.
Workaround:
This bug can be fixed by checking that the ?pid? GET variable actually
represents a support ticket owned by the user of the current session.
Vendor Contact:
Lpanel.NET's Lpanel
URL: http://www.lpanel.net/
Email: sales@xxxxxxxxxx (I was unable to find a more relevant email contact)
Mailing Address:
Lpanel.NET
PO Box 940876
Miami, Florida 33194-0056
United States
Phone: 614-441-4838
Disclosure Timeline:
Vendor Notified: June 6, 2005
Public Release: June 6, 2005
About the Author:
The author is in between life paths at the moment, but is currently a software
engineer at a company to remain unnamed. When not at his computer, the author
enjoys doing a great many things, most of which he has lost all time for, or
lacks people to do those things with in his current lifestyle. As such he finds
more time for work, or just visits Blockbuster, and when all else fails,
fabricates reports such as this.
The author is posting this message anonymously in order to avoid potential
legal consequences, although he is having trouble seeing any potential
consequences as feasible, considering the vendor does not release a plain-text
version of their license (the license is actually encoded, and when viewed,
renders a PHP parse error).
Greets:
I'd like to say hi to the team with which I work; you're all great. I'd also
like to say hello to swoolley and tautology.
--
_______________________________________________
Check out the latest SMS services @ http://www.linuxmail.org
This allows you to send and receive SMS through your mailbox.
Powered by Outblaze
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/