The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

cPanel TSR-2014-0005 Full Disclosure

Discussion in 'cPanel Announcements' started by cPanelCory, Jul 28, 2014.

  1. cPanelCory

    cPanelCory Developer - cPanel Security Team
    Staff Member

    Joined:
    Jan 18, 2008
    Messages:
    69
    Likes Received:
    5
    Trophy Points:
    8
    Location:
    Houston
    cPanel Access Level:
    Root Administrator
    Case 93317

    Summary

    Limited SQL injection vulnerability in LeechProtect.

    Security Rating

    cPanel has assigned a Security Level of Minor to this vulnerability.

    Description

    The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem was vulnerable to a limited SQL injection in its handling of IP subnets due to incorrect escaping.

    Credits

    This issue was discovered by Rack911.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 93321

    Summary

    Limited arbitrary file modification via LeechProtect subsystem.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem performed insufficient validation of the data passed to it by Apache, which allowed a local attacker to modify the password files controlling email, FTP, WebDAV, or HTTP accounts for other users on the local system.

    Credits

    This issue was discovered by Rack911.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 97233

    Summary

    Process locking based on 'ps' vulnerable to attack by local users.

    Security Rating

    cPanel has assigned a Security Level of Minor to this vulnerability.

    Description

    Several subsystems in cPanel & WHM used the output from 'ps' to prevent multiple instances of an operation from occurring simultaneously. Due to flaws in the way 'ps' output was parsed, an authenticated local attacker could create processes that blocked these subsystems from operating.

    Credits

    This issue was discovered by Rack911.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 98253

    Summary

    Insecure permissions on eximstats SQL password file.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    The eximstats functionality of cPanel & WHM allows an administrator to generate reports of mail activity on the server. When switching to a remote MySQL server, the file containing the password for the eximstats database was set to world-readable permissions. This allowed a local attacker to gain access to the eximstats database.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 99749

    Summary

    Bypass of account ownership restrictions during account creation.

    Security Rating

    cPanel has assigned a Security Level of Important to this vulnerability.

    Description

    The WHM /scripts5/wwwacct and "createacct" API commands allowed resellers with limited privileges to supply unsafe "force", "forcedns", and "is_restore" options during account creation. These options would allow a reseller without the "all" ACL to take control over other existing accounts on the system and bypass other account creation restrictions.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 99861

    Summary

    Update analysis logs sent without proper SSL certificate validation.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    cPanel & WHM includes opt-in functionality to submit copies of various system log files to cPanel for quality assurance purposes. This system posts a tarball containing the files to a cPanel controlled server using HTTPS. Validation of the SSL certificate used during this connection was disabled, potentially allowing an attacker to masquerade as the cPanel log processing server and connect the information being submitted.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 100677

    Summary

    Arbitrary file unlink via fixwebalizer script.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    The fixwebalizer script removed files from the target user's home directory while running with the effective permissions of the root user. A malicious local user could leverage this behavior to delete arbitrary files on the system.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 100957

    Summary

    Arbitrary YAML file read via import_old_support_cfg script.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    The import_old_support_cfg script runs automatically during the nightly upcp process to migrate reseller support contact information settings from an old configuration format into a new one. This script performed an unsafe YAML file read inside the reseller's home directory while running with root's permissions. A local attacker could use this flaw to copy data from an arbitrary YAML file into their home directory.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 101677

    Summary

    Bypass of account suspension via mail filters.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    cPanel & WHM's functionality for suspending an account allows mail delivery to continue normally while disabling website access. Using the mail filter functionality of cPanel & WHM, a suspended account could remove the .htaccess files used to disable website access. Apache virtual host includes are used now, rather than .htaccess files to prevent web access from being restored in this fashion.

    Credits

    This issue was discovered by Matt Sheldon.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 103341

    Summary

    Arbitrary code execution via Mailman pickle files.

    Security Rating

    cPanel has assigned a Security Level of Important to this vulnerability.

    Description

    Mailman uses Python pickle files to store configuration values. With some configurations of Apache, the pickle files used by mailman were given incorrect file ownership settings. A local attacker could utilize this fact to overwrite one of Mailman’s pickle files and execute arbitrary code when the pickle file was deserialized (BugTrack ID 5257). Under some circumstances, this would allow a local attacker to execute arbitrary code as root.

    Credits

    This issue was discovered by the cPanel Security Team.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23

    Case 105337

    Summary

    Arbitrary file read via Exim virtual aliases.

    Security Rating

    cPanel has assigned a Security Level of Important to this vulnerability.

    Description

    A crafted string in an Exim user valias configuration file could allow a user to read any file on the system. This was caused by incorrect configuration of the user and group settings in Exim's router configurations.

    Credits

    This issue was discovered by Rack911.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Case 105353

    Summary

    Bypass of commondomains and hostname restrictions in WHM Add DNS interface.

    Security Rating

    cPanel has assigned a Security Level of Moderate to this vulnerability.

    Description

    The WHM Add DNS interface allows a reseller to assign ownership of a DNS zone to a specific cPanel account. This interface did not enforce DNS zone restrictions against the use of the server's hostname or domains listed in the commondomains file. Resellers with the "create-dns" ACL could leverage this behavior to bypass these restrictions.

    Credits

    This issue was discovered by Rack911.

    Solution

    This issue is resolved in the following builds:
    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    Multiple Cases (10)

    Summary

    Multiple XSS vulnerabilities in various interfaces.

    Description

    Output filtering errors in several different interfaces allowed JavaScript inputs to be returned to the browser without proper filtering. The affected interfaces are listed below.

    Case: 99353
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: WHM
    URLs: /scripts2/sshkeys
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 99637
    Security Rating: Moderate
    XSS Type: Stored
    Interface: WHM
    URLs: /scripts4/listaccts
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 100669
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: WHM
    URLs: /cgi/addrbl.cgi
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 100685
    Security Rating: Important
    XSS Type: Stored
    Interface: WHM
    URLs: /scripts/reallyemailall
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 101013
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: WHM
    URLs: /cgi/diskusage.cgi
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 102853
    Security Rating: Minor
    XSS Type: Self
    Interface: WHM
    URLs: /cgi/easyapache.pl
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 102877
    Security Rating: Minor
    XSS Type: Self
    Interface: WHM
    URLs: /scripts9/upload_legacy_file
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    Case: 104033
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: cPanel
    URLs: /frontend/paper_lantern/ssl/viewcrt.html, /frontend/x3/ssl/viewcrt.html
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: Cody Brocious

    Case: 105229
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: cPanel
    URLs: /frontend/paper_lantern/ssl/viewkey.html, /frontend/x3/ssl/viewkey.html
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: Cody Brocious

    Case: 105273
    Security Rating: Minor
    XSS Type: Self-stored
    Interface: cPanel
    URLs: /frontend/paper_lantern/ssl/viewcsr.html, /frontend/x3/ssl/viewcsr.html
    Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
    Reporter: cPanel Security Team

    cPanel includes a comprehensive protection mechanism against XSS and XSRF attacks called Security Tokens. Security Tokens protection is enabled by default in all installs of cPanel & WHM. When Security Tokens protection is enabled, an attacker intending to utilize any self-XSS vulnerabilities must convince the victim to navigate their browser to the appropriate cPanel or WHM interface and manually input the JavaScript payload.

    Credits

    These issues were discovered by the respective reporters listed above.

    Solution

    These issues are resolved in the following builds:

    11.44.1.5
    11.44.0.29
    11.42.1.23
    11.40.1.18

    For the PGP-signed message, see: http://cpanel.net/wp-content/uploads/2014/07/TSR-2014-0005-Full-Disclosure.txt
     
Loading...

Share This Page