Multiple vulnerabilities in ZPanel 10.0.1

Multiple vulnerabilities in ZPanel 10.0.1

Posted on Jun 25 2013   |  Plain text version


Several vulnerabilties were discovered in ZPanel 10.0.1 during our pro bono security audit. The ZPanel team has addressed these issues in version 10.0.2 and it is advised to upgrade.


Version: 10.0.1 and previous versions
Date of report: 06/01/2012
Date of publication: 01/18/2013
Severity: Critical
Solution: Update to 10.0.2

ZPanel is a web-based web hosting control panel that runs on top of Apache, PHP and MySQL. ZPanel integrates with various open-source and cross platform applications and servers enabling ZPanel to be compatible with various platforms. It allows you to administer the following applications: Apache, hMailServer, FileZilla Server, Postfix MTA, Dovecot IMAP/POP3, ProFTP Daemon, MySQL, PHP, Webalizer, RoundCube, phpMyAdmin and phpSysInfo.

Several vulnerabilities such as SQL Injections, Cross Site Scripting, Code Execution, Authentication Bypass, CSRF and others have been found in ZPanel 10.0.1. It is highly recommended to upgrade to Zpanel 10.0.2.


ZPanel participated in our pro bono security audit program for open-source projects, therefor all vulnerabilities have been reported privately. We highly recommend updating to the latest version: v10.0.2.

Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.