The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Bugtraq: cPanel hardlink backup issue

Discussion in 'General Discussion' started by bashprompt18, Oct 18, 2004.

  1. bashprompt18

    bashprompt18 Active Member

    Joined:
    Jun 27, 2004
    Messages:
    28
    Likes Received:
    0
    Trophy Points:
    6
    Location:
    Garden Valley, Ca
    Name: cPanel
    Vendor URL: http://www.cpanel.net
    Author: Karol Wiesek <appelast@drumnbass.art.pl>
    Date: July 19, 2004

    Issue:
    cPanel backup feature allows logged in users to read any file, including
    they have not permission to read to.

    Description:
    cPanel is a next generation web hosting control panel system. cPanel is
    extremely feature rich as well as include an easy to use web based
    interface (GUI). cPanel is designed for the end users of your system and
    allows them to control everything from adding / removing email accounts
    to administering MySQL databases.

    Details:
    cPanel backup system allows attacker to insert into archive and then
    download files, that he does not have permission to access. System
    backup follows hard links ( thus it is only possible on the same
    partition ) and copies it into tar.gz archive. Attacker could use php,
    cgi, crontab or shell access to link file in his public_html to for
    example /etc/shadow, and then execute backup ( Backup ->
    Generate/Download a Full Backup ).

    Exploit:
    To exploit this vulnerability just link file you want to grab to some
    file in $HOME and execute backup.

    Tested on cPanel 9.4.1-RELEASE-64, and confirmed vulnerable.
     
Loading...

Share This Page