SEC-1
Summary
Arbitrary code could be executed as other accounts with RUID2/ITK enabled.
Security Rating
cPanel has assigned this vulnerability a CVSSv2 score of 4.9 (AV:N/AC:M/Au:S/C:P/I:P/A:N)
Description
The WHM “Apache mod_userdir Tweak” interface incorrectly allowed the exclusion of specific users from userdir protection when mod_ruid2 or MPM-ITK was in use on the server. With this misconfiguration, the excluded user could execute arbitrary code with the UID and GID of the excluding virtualhost via Apache userdir URLs.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
11.46.2.2
11.46.1.6
11.44.2.4
11.42.1.30
SEC-4
Summary
Noshell restriction bypass via SFTP connections.
Security Rating
cPanel has assigned this vulnerability a CVSSv2 score of 2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)
Description
On cPanel & WHM systems, accounts configured with “noshell” as their login shell may still connect to the server using SFTP. Users connecting in this fashion had access to the /proc filesystem. By modifying ‘/proc/self/mem’, an attacker could execute arbitrary code as if connected via a normal shell.
Credits
This issue was discovered by Jann Horn.
Solution
This issue is resolved in the following builds:
11.46.2.2
11.46.1.6
11.44.2.4
11.42.1.30
SEC-8
Summary
Stored XSS vulnerability in cPDAVd directory index functionality.
Security Rating
cPanel has assigned this vulnerability a CVSSv2 score of 3.5 (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Description
cPDAVd did not correctly HTML escape filenames included in the HTML it generated for directory indexes. This allowed attackers with the ability to generate files with XSS payloads to conduce stored-XSS attacks against the authenticated cPDAVd user if the user connected with to WebDAV services using a normal web browser.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
11.46.2.2
11.46.1.6
11.44.2.4
11.42.1.30
For the PGP-signed message, see http://cpanel.net/wp-content/uploads/2015/01/TSR-2015-0001-Full-Disclosure.txt.