cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system.
cPanel has rated these updates as having CVSSv3.1 scores ranging from 2.5 to 3.3.
Information on cPanel’s security ratings is available at https://go.cpanel.net/securitylevels.
If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience.
Summary
Reseller suspension lock bypass.
Security Rating
cPanel has assigned this vulnerability a CVSSv3.1 score of 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Description
It is possible to suspend an already suspended account via the WHM API. This can allow for an attacker to re-suspend and then unsuspend an account suspension-locked by the root user.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
11.92.0.9
11.86.0.36
Summary
MySQL user suspension fails with old-style password hashes.
Security Rating
cPanel has assigned this vulnerability a CVSSv3.1 score of 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Description
When suspending a MySQL user with old-style password hashes on a MySQL 5.5 system, suspendacct would fail to disable the passwords. This allowed access to the databases to remain active.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
11.92.0.9
11.86.0.36
For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat
For the PGP-Signed message please seeĀ the linked document here.