The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

vulns reported by secunia

Discussion in 'General Discussion' started by claudio, Nov 14, 2006.

  1. claudio

    claudio Well-Known Member

    Joined:
    Jul 31, 2004
    Messages:
    201
    Likes Received:
    0
    Trophy Points:
    16
    Just receive this from secunia right now, is this some new vulnerability or is an old issue?

    thanks

    Claudio
    ----------------------------------------------------------------------

    TITLE:
    CPanel Multiple Vulnerabilities

    SECUNIA ADVISORY ID:
    SA22825

    VERIFY ADVISORY:
    http://secunia.com/advisories/22825/

    CRITICAL:
    Less critical

    IMPACT:
    Hijacking, Cross Site Scripting

    WHERE:
    >From remote

    SOFTWARE:
    cPanel 10.x
    http://secunia.com/product/5280/

    DESCRIPTION:
    Aria-Security has reported some vulnerabilities in cPanel, which can
    be exploited by malicious users to conduct script insertion attacks
    and by malicious people to conduct cross-site scripting and
    cross-site request forgery attacks.

    1) Input passed to the "dir" parameter in files/seldir.html and
    htaccess/newuser.html is not properly sanitised before being used to
    include files. This can be exploited to execute arbitrary HTML and
    script code in a user's browser session in context of affected site.

    2) Input passed to the "user" parameter in htaccess/newuser.html is
    not properly sanitised before being used. This can be exploited to
    insert arbitrary HTML and script code, which will be executed in an
    administrative user's browser session in context of an affected
    site.

    Successful exploitation requires administrative privileges.

    3) An error exists due to the application allowing users to perform
    certain actions via HTTP requests without performing any validity
    checks to verify the user's request. This can e.g. be exploited
    conduct script insertion attacks in combination with vulnerability
    #2.

    The vulnerabilities are reported in version 10. Other versions may
    also be affected.

    SOLUTION:
    Do not follow links from untrusted sources or visit untrusted web
    sites while being logged in to the application.

    PROVIDED AND/OR DISCOVERED BY:
    Aria-Security

    ORIGINAL ADVISORY:
    http://aria-security.net/advisory/cpanel.txt

    ----------------------------------------------------------------------

    About:
    This Advisory was delivered by Secunia as a free service to help
    everybody keeping their systems up to date against the latest
    vulnerabilities.

    Subscribe:
    http://secunia.com/secunia_security_advisories/

    Definitions: (Criticality, Where etc.)
    http://secunia.com/about_secunia_advisories/


    Please Note:
    Secunia recommends that you verify all advisories you receive by
    clicking the link.
    Secunia NEVER sends attached files with advisories.
    Secunia does not advise people to install third party patches, only
    use those supplied by the vendor.
     

Share This Page