claudio

Well-Known Member
Jul 31, 2004
201
0
166
Just receive this from secunia right now, is this some new vulnerability or is an old issue?

thanks

Claudio
----------------------------------------------------------------------

TITLE:
CPanel Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA22825

VERIFY ADVISORY:
http://secunia.com/advisories/22825/

CRITICAL:
Less critical

IMPACT:
Hijacking, Cross Site Scripting

WHERE:
>From remote

SOFTWARE:
cPanel 10.x
http://secunia.com/product/5280/

DESCRIPTION:
Aria-Security has reported some vulnerabilities in cPanel, which can
be exploited by malicious users to conduct script insertion attacks
and by malicious people to conduct cross-site scripting and
cross-site request forgery attacks.

1) Input passed to the "dir" parameter in files/seldir.html and
htaccess/newuser.html is not properly sanitised before being used to
include files. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of affected site.

2) Input passed to the "user" parameter in htaccess/newuser.html is
not properly sanitised before being used. This can be exploited to
insert arbitrary HTML and script code, which will be executed in an
administrative user's browser session in context of an affected
site.

Successful exploitation requires administrative privileges.

3) An error exists due to the application allowing users to perform
certain actions via HTTP requests without performing any validity
checks to verify the user's request. This can e.g. be exploited
conduct script insertion attacks in combination with vulnerability
#2.

The vulnerabilities are reported in version 10. Other versions may
also be affected.

SOLUTION:
Do not follow links from untrusted sources or visit untrusted web
sites while being logged in to the application.

PROVIDED AND/OR DISCOVERED BY:
Aria-Security

ORIGINAL ADVISORY:
http://aria-security.net/advisory/cpanel.txt

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.