[原文]clogin.php in Benchmark Designs' WHM AutoPilot 2.4.5 and earlier allows remote attackers to obtain plaintext username and password credentials by using the clogin_e and base64_encode functions to encode the desired user ID in the c parameter, then read the plaintext values in the resulting form.
WHM AutoPilot contains a flaw that may lead to an unauthorized information disclosure. The issue is due to an error in client login page "clogin.php". By calculating the hash value of user ID with "clogin_e()" and sending a specially crafted URI with the hash to the "c" parameter in "clogin.php" script, a remote attacker can retrive the username and password in plaintext, which will result in a loss of confidentiality.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Restrict access using .htaccess or similar to limit the exposure.