Affected software: DirectAdmin versions below 1.58.2

DirectAdmin performs file compression with tar as root in user owned directories and can be tricked to overwrite any file in a system. Due to very limited control over file contents, privilege escalation might not be possible or hard to achieve.

During tally, DirectAdmin executes /bin/tar czf /home/USER/domains/DOMAIN/logs/MONTH-YEAR.tar.gz -C /var/log/httpd/domains DOMAIN.log DOMAIN.error.log as root with destination file inside user-owned directory, which allows user to destroy any file in a system using symlinks.


No exploit was created for that vulnerability.


Update DirectAdmin to version 1.58.2 or later.


  • 2019-08-22 - Vulnerability reported to vendor.
  • 2019-08-22 - Response from vendor and fix in pre-release binaries.
  • 2019-08-27 - DirectAdmin 1.58.2 released with vulnerability fixed.