InterWorx-CP Multiple HTMl Injection Vulnerabilities

Hi’ve just came across this article about interworx 3.0.2:
http://www.hackerscenter.com/archive/view.asp?id=27884

I didn’t do any testing, but this way hope to keep interworx guys informed for future upgrades

Regards

Copy > paste (article)

[SIZE=2] [HSC] InterWorx-CP Multiple HTMl Injection Vulnerabilities

The InterWorx [COLOR=#003366 ! important]Hosting[/COLOR] Control Panel (InterWorx-CP) is a dedicated server control panel. InterWorx suffers from multiple HTMl injection vulnerabilities. JavaScript and Cross site scripting are just few found vulns, more sophisticated attacks such as remote file inclusion or even
SQl injection may be possible. An attacker could exploit this vulnerability to have arbitrary script code execute in the context of the affected site. This may allow an attacker to steal cookie-based authentication credentials
and to launch other attacks.

Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz

Remote: Yes
Local: Yes
Class: Input Validation Error

Products:

Vendor: InterWorx L.L.C. http://interworx.com

  • Attackers can exploit these issues via a web client.

Remote Holes:

/nodeworx/index.php/<Evil(XSS)-Code>

/siteworx/index.php/<Evil(XSS)-Code>

Local Holes:

  • (NodeWorx)

/nodeworx/nodeworx.php/<Evil-Code>
/nodeworx/users.php/<Evil-Code>
/nodeworx/lang.php/<Evil-Code>
/nodeworx/themes.php/<Evil-Code>
/nodeworx/setup.php/<Evil-Code>
/nodeworx/siteworx.php/<Evil-Code>
/nodeworx/packages.php/<Evil-Code>
/nodeworx/backup.php/<Evil-Code>
/nodeworx/import.php/<Evil-Code>
/nodeworx/scriptworx.php/<Evil-Code>
/nodeworx/resellers.php/<Evil-Code>
/nodeworx/reseller-packages.php/<Evil-Code>
/nodeworx/http.php/<Evil-Code>
/nodeworx/mail.php/<Evil-Code>
/nodeworx/ftp.php/<Evil-Code>
/nodeworx/mysql.php/<Evil-Code>
/nodeworx/sshd.php/<Evil-Code>
/nodeworx/nfs.php/<Evil-Code>
/nodeworx/cron.php/<Evil-Code>
/nodeworx/ip.php/<Evil-Code>
/nodeworx/firewall.php/<Evil-Code>
/nodeworx/updates.php/<Evil-Code>
/nodeworx/rrd.php/<Evil-Code>
/nodeworx/cluster.php/<Evil-Code>

  • (SiteWorx)

/siteworx/siteworx.php/<Evil-Code>
/siteworx/users.php/<Evil-Code>
/siteworx/cron.php
/siteworx/prefs.php
/siteworx/ftp.php/<Evil-Code>
/siteworx/mysql.php/<Evil-Code>
/siteworx/domains.php/<Evil-Code>
/siteworx/htaccess.php/<Evil-Code>
/siteworx/scriptworx.php/<Evil-Code>
/siteworx/stats.php/<Evil-Code>
/siteworx/backup.php/<Evil-Code>
/siteworx/restore.php/<Evil-Code>
/siteworx/httpd.php/<Evil-Code>

[/SIZE]

Amusingly enough, the bottom of the mail on the BugTraq list has a blurb on how to become an ethical hacker. IIRC, part of that involves responsible disclosure policies.

Needless to say, we’re looking into this.

Thanks.

Paul

We’ve just released version 3.0.3 to address this issue.

See: http://interworx.com/forums/showthread.php?t=2501

Thanks,

Paul