Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 16 May 2013 12:11:08 -0600
From: Kurt Seifried <>
Subject: Re: CVE-2013-2097: zPanel themes remote command execution
 as root

Hash: SHA1

On 05/15/2013 07:33 PM, Kurt Seifried wrote:
> So I saw this earlier today:
>  and flipped through the forum thread on the zpanel site, but
> didn't have time until now to deal with it. So first off: I saw all
> this stuff and read it before it was removed from the site
> (actually the entire site appears to be down now).
> So long and short: you upload a template with the following code:
> <& bogus ']; exec("/etc/zpanel/panel/bin/zsudo touch /root/derp"); 
> echo $value['bogus &>
> and the command gets executed as root. From googling it appears
> that zPanel won't work with SELinux enabled, which makes sense
> (most web applications fail to ship an SELinux policy, so if they
> need to do strange things outside the default policy they generally
> tell you to simply disable SELinux). So if you run zPanel it would
> be normal to disable SELinux (to make zPanel work), so this root
> level access won't be restricted.
> This issue has been assigned CVE-2013-2097.
> There is also a mention of a CSRF but I couldn't find any
> additional information on it, if anyone knows about this please
> email me/oss-security with details.

Ok and "joepie91" on reddit posted:

It's a pretty basic (and more annoying than harmful) CSRF - basically, will log out the user from
a panel, no matter where it's called from. There's no logout key, and
no referer checking.

Insert <img src=""> on any
site and anyone that visits the page will have their session killed instantly.

I can't verify this, but even if true it appears that there is no real
trust boundary violation (user clicks the link, they get logged out,
or JavaScript is used to trigger it, whatever). Unless someone can
show otherwise not assigning a CVE for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Version: GnuPG v1.4.13 (GNU/Linux)


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.