Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

symlink race condition triggered by IP address

Discussion in 'Security' started by DigitalEssence, Jun 25, 2018.

  1. DigitalEssence

    DigitalEssence Active Member

    Joined:
    May 21, 2014
    Messages:
    29
    Likes Received:
    2
    Trophy Points:
    3
    cPanel Access Level:
    Root Administrator
    Hi,

    I'm running EA4 and have Symlink Protection on and I keep on seeing entries in the lfd log for:

    symlink race condition triggered by xxx.xxx.xxx.xxx

    These are all for one WordPress website and I know that the users involved are trustworthy

    The entries in my Apache error log are as such and all relate to the use of mailman


    [Mon Jun 25 10:19:35.740170 2018] [core:error] [pid 22650] [client XXX.XXX.XXX.XXX:62127] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/mailman.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members?letter=d
    [Mon Jun 25 10:19:35.766063 2018] [core:error] [pid 19756] [client XXX.XXX.XXX.XXX:62131] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/gnu-head-tiny.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members?letter=d
    [Mon Jun 25 10:19:35.771963 2018] [core:error] [pid 23129] [client XXX.XXX.XXX.XXX:62130] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/PythonPowered.png, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members?letter=d
    [Mon Jun 25 10:20:20.911402 2018] [core:error] [pid 19747] [client XXX.XXX.XXX.XXX:62152] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/mailman.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members/add
    [Mon Jun 25 10:20:20.929152 2018] [core:error] [pid 19756] [client XXX.XXX.XXX.XXX:62157] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/PythonPowered.png, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members/add
    [Mon Jun 25 10:20:20.929711 2018] [core:error] [pid 23106] [client XXX.XXX.XXX.XXX:62158] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/gnu-head-tiny.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/members/add
    [Mon Jun 25 10:20:28.421186 2018] [core:error] [pid 24425] [client XXX.XXX.XXX.XXX:62165] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/mailman.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/logout
    [Mon Jun 25 10:20:28.440319 2018] [core:error] [pid 22650] [client XXX.XXX.XXX.XXX:62168] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/PythonPowered.png, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/logout
    [Mon Jun 25 10:20:28.440335 2018] [core:error] [pid 20568] [client XXX.XXX.XXX.XXX:62169] Caught race condition abuser. attacker: 1012, victim: 0 open file owner: 0, open file: /usr/local/cpanel/img-sys/gnu-head-tiny.jpg, referer: http://domainname.co.uk/mailman/admin/pilots_domainname.co.uk/logout


    The site has an iframe going to Dutyman but apart from that, it is a standard website.

    Is it possible to disable Symlink protection for one domain as I can't think of any way around this issue.

    Advice and ideas appreciated.

    Thanks.
     
    #1 DigitalEssence, Jun 25, 2018
    Last edited: Jun 25, 2018
  2. cPanelMichael

    cPanelMichael Technical Support Community Manager
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    45,195
    Likes Received:
    1,936
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Twitter:
    Hello @DigitalEssence,

    Are you using the Symlink Protection option in the Global Configuration section of WHM's Apache Configuration interface (WHM >> Home >> Service Configuration >> Apache Configuration)? If so, this is also known as the BlueHost patch and includes the following note in our documentation:

    Are you able to disable this method of symlink protection and use one of the alternate methods to protect against symlink attacks? We document the available options at:

    Symlink Race Condition Protection - EasyApache 4 - cPanel Documentation

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice