The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Not authorized to access “cpses_$session_name”

Discussion in 'Security' started by keat63, Jan 21, 2015.

  1. keat63

    keat63 Well-Known Member

    Joined:
    Nov 20, 2014
    Messages:
    765
    Likes Received:
    20
    Trophy Points:
    18
    cPanel Access Level:
    Root Administrator
    Another Question About My Log Files, could anyone offer any assistance in deciphering what it all means.

    Code:
    [2015-01-20 19:04:54 +0000] warn [cpses_tool] The user “xxxx” is not authorized to access “cpses_beXgZeMzqy” for revoking permissions from all. at /usr/local/cpanel/Cpanel/DBAdmin.pm line 160
            Cpanel::DBAdmin::_log_error_and_output_return(Cpanel::Mysql=HASH(0x3610138), 'The user \xE2\x80\x9C[_1]\xE2\x80\x9D is not authorized to access \xE2\x80\x9C[_2]\xE2\x80\x9D for revoking permissions from all.', 'xxxx', 'cpses_beXgZeMzqy') called at /usr/local/cpanel/Cpanel/DBAdmin.pm line 183
            Cpanel::DBAdmin::_log_error_and_output(Cpanel::Mysql=HASH(0x3610138), 'The user \xE2\x80\x9C[_1]\xE2\x80\x9D is not authorized to access \xE2\x80\x9C[_2]\xE2\x80\x9D for revoking permissions from all.', 'xxxx', 'cpses_beXgZeMzqy') called at /usr/local/cpanel/Cpanel/Mysql.pm line 501
            Cpanel::Mysql::_dbowner_to_all_with_ownership_checks(Cpanel::Mysql=HASH(0x3610138), 'method', 'REVOKE', 'users', HASH(0x36294f8)) called at /usr/local/cpanel/Cpanel/Mysql.pm line 465
            Cpanel::Mysql::remove_dbowner_from_all(Cpanel::Mysql=HASH(0x3610138), 'cpses_beXgZeMzqy') called at bin/cpses_tool.pl line 139
            bin::cpses_tool::__ANON__() called at bin/cpses_tool.pl line 155
            bin::cpses_tool::action_REMOVETEMPDBOWNER('bin::cpses_tool', HASH(0x360fa60)) called at bin/cpses_tool.pl line 64
            bin::cpses_tool::process_request(HASH(0x360fa60)) called at bin/cpses_tool.pl line 51
            bin::cpses_tool::script('bin::cpses_tool') called at bin/cpses_tool.pl line 27
     
    #1 keat63, Jan 21, 2015
    Last edited: Jan 21, 2015
  2. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,678
    Likes Received:
    648
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
    Hello :)

    This was previously addressed with internal case number 100145 in cPanel version 11.44.1.0. Could you verify that you are using a newer version of cPanel on this server?

    Thank you.
     
  3. keat63

    keat63 Well-Known Member

    Joined:
    Nov 20, 2014
    Messages:
    765
    Likes Received:
    20
    Trophy Points:
    18
    cPanel Access Level:
    Root Administrator
    11.46.1 (build 4)
     
  4. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,678
    Likes Received:
    648
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
    You should be able to manually remove the session file from within the "/var/cpanel/cpses/keys" directory to address the issue, but feel free to open a support ticket so we can take a closer look. You can post the ticket number here so we can update this thread with the outcome.

    Thank you,
     
  5. keat63

    keat63 Well-Known Member

    Joined:
    Nov 20, 2014
    Messages:
    765
    Likes Received:
    20
    Trophy Points:
    18
    cPanel Access Level:
    Root Administrator
    Hi Michael.

    I only saw one instance of this, which looking at the logs occurred last night.
    I've just looked in /var/cpanel/cpses/keys, and can't see anything resembling cpses_beXgZeMzqy, so maybe it was a one off.
    I'm happy to let this go if it's nothing malicious ??
     
  6. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,678
    Likes Received:
    648
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
Loading...

Share This Page