CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://forum.centos-webpanel.com/informations/ | vendor advisory |
https://www.exploit-db.com/exploits/46669/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0.9.8.753-Pro-Cross-Site-Scripting.html | vdb entry third party advisory |
https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt | vdb entry third party advisory |
http://www.securityfocus.com/bid/108035 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/46669 | exploit vdb entry third party advisory |