The WHM interface 11.15.0 for cPanel 11.18 before 11.18.4 and 11.22 before 11.22.3 allows remote attackers to bypass XSS protection and inject arbitrary script or HTML via repeated, improperly-ordered "<" and ">" characters in the (1) issue parameter to scripts2/knowlegebase, (2) user parameter to scripts2/changeip, (3) search parameter to scripts2/listaccts, and other unspecified vectors.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://changelog.cpanel.net/?revision=0%3Btree=%3Btreeview=%3Bshow=html%3Bpp=25%3Bte=1314%3Bpg=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42305 | vdb entry |
http://www.securityfocus.com/archive/1/491864/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/1522/references | vdb entry |
http://securityreason.com/securityalert/3866 | third party advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2008-May/062197.html | mailing list |
http://www.securityfocus.com/bid/29125 | vdb entry exploit |
http://secunia.com/advisories/30166 | third party advisory |