Open Source Multi-Hosting Kloxo Control Panel has been found with getting wildly
exploited with an unauthenticated SQL injection vulnerability The SQL injection issue can be abused in order to retrieve the Kloxo admin cleartext password from the database. With admin access to the web control panel, remote PHP code execution can be achieved by abusing the Command Center function. The module tries to find the first server in the tree view, unless the server information is provided, in which case it executes the payload there.
You can find References here :-
Kloxo Exploited :- https://vpsboard.com/topic/3384-kloxo-installations-compromisedKloxo Exploired :- http://www.webhostingtalk.com/showthread.php?p=8996984Patch Discussion :- http://forum.lxcenter.org/index.php?t=msg&th=19215&goto=102646
here is metasploit module URL :- http://packetstormsecurity.com/files/125152/kloxo_sqli.rb.txt
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/linux/http/kloxo_sqli
msf exploit(kloxo_sqli) > show targets
...targets...
msf exploit(kloxo_sqli) > set TARGET
msf exploit(kloxo_sqli) > show options
...show and set options...
msf exploit(kloxo_sqli) > exploit
Kindly Update your Kloxo to Latest Version. Kloxo has now latest release version 6.1.16