Skip to content

Instantly share code, notes, and snippets.

@mr404ntf
Created April 24, 2023 23:39
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mr404ntf/9c8728ee8f35d9744feec3828df1085d to your computer and use it in GitHub Desktop.
Save mr404ntf/9c8728ee8f35d9744feec3828df1085d to your computer and use it in GitHub Desktop.
CVE-2022-42175 public reference

CVE-2022-42175: Insecure Direct Object Reference vulnerability in 4.1.2 SolusVM-WHMCS allows an attacker to change the password and hostname of other customer servers without authorization.

The vulnerability is caused by a lack of proper authorization checks in the SolusVM-WHMCS software. An attacker who is authenticated to the application can send requests to change the password and hostname of other customer servers by modifying the ID parameter in the request to reference the target server. This allows the attacker to take control of the target server and potentially cause further harm to the customer's infrastructure.

This vulnerability affects SolusVM-WHMCS 4.1.2 [fixed in the 4.2.0 version], and it can be exploited remotely by an authenticated attacker. A successful exploit could lead to unauthorized access to other customer servers and the potential compromise of sensitive data.

SolusVM recommends that customers apply the latest patch to their installation to mitigate this vulnerability. Additionally, customers should monitor their systems for unauthorized access and suspicious activity.

This CVE entry was assigned by Mitre, the organization responsible for assigning CVE identifiers and found by the researcher Kevin Coupal, For more information about this vulnerability, please refer to the SolusVM security advisory github: https://github.com/solusio/SolusVM-WHMCS-Module/releases/tag/v4.2.0.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment