Newsroom

cPanel TSR-2014-0005 Full Disclosure

Case 93317

Summary

Limited SQL injection vulnerability in LeechProtect.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem was vulnerable to a limited SQL injection in its handling of IP subnets due to incorrect escaping.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18


Case 93321

Summary

Limited arbitrary file modification via LeechProtect subsystem.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem performed insufficient validation of the data passed to it by Apache, which allowed a local attacker to modify the password files controlling email, FTP, WebDAV, or HTTP accounts for other users on the local system.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 97233

Summary

Process locking based on ‘ps’ vulnerable to attack by local users.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

Several subsystems in cPanel & WHM used the output from ‘ps’ to prevent multiple instances of an operation from occurring simultaneously. Due to flaws in the way ‘ps’ output was parsed, an authenticated local attacker could create processes that blocked these subsystems from operating.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 98253

Summary

Insecure permissions on eximstats SQL password file.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The eximstats functionality of cPanel & WHM allows an administrator to generate reports of mail activity on the server. When switching to a remote MySQL server, the file containing the password for the eximstats database was set to world-readable permissions. This allowed a local attacker to gain access to the eximstats database.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 99749

Summary

Bypass of account ownership restrictions during account creation.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The WHM /scripts5/wwwacct and “createacct” API commands allowed resellers with limited privileges to supply unsafe “force”, “forcedns”, and “is_restore” options during account creation. These options would allow a reseller without the “all” ACL to take control over other existing accounts on the system and bypass other account creation restrictions.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 99861

Summary

Update analysis logs sent without proper SSL certificate validation.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

cPanel & WHM includes opt-in functionality to submit copies of various system log files to cPanel for quality assurance purposes. This system posts a tarball containing the files to a cPanel controlled server using HTTPS. Validation of the SSL certificate used during this connection was disabled, potentially allowing an attacker to masquerade as the cPanel log processing server and connect the information being submitted.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 100677

Summary

Arbitrary file unlink via fixwebalizer script.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The fixwebalizer script removed files from the target user’s home directory while running with the effective permissions of the root user. A malicious local user could leverage this behavior to delete arbitrary files on the system.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 100957

Summary

Arbitrary YAML file read via import_old_support_cfg script.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The import_old_support_cfg script runs automatically during the nightly upcp process to migrate reseller support contact information settings from an old configuration format into a new one. This script performed an unsafe YAML file read inside the reseller’s home directory while running with root’s permissions. A local attacker could use this flaw to copy data from an arbitrary YAML file into their home directory.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 101677

Summary

Bypass of account suspension via mail filters.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

cPanel & WHM’s functionality for suspending an account allows mail delivery to continue normally while disabling website access. Using the mail filter functionality of cPanel & WHM, a suspended account could remove the .htaccess files used to disable website access. Apache virtual host includes are used now, rather than .htaccess files to prevent web access from being restored in this fashion.

Credits

This issue was discovered by Matt Sheldon.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 103341

Summary

Arbitrary code execution via Mailman pickle files.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

Mailman uses Python pickle files to store configuration values. With some configurations of Apache, the pickle files used by mailman were given incorrect file ownership settings. A local attacker could utilize this fact to overwrite one of Mailman’s pickle files and execute arbitrary code when the pickle file was deserialized (BugTrack ID 5257). Under some circumstances, this would allow a local attacker to execute arbitrary code as root.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23

Case 105337

Summary

Arbitrary file read via Exim virtual aliases.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

A crafted string in an Exim user valias configuration file could allow a user to read any file on the system. This was caused by incorrect configuration of the user and group settings in Exim’s router configurations.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 105353

Summary

Bypass of commondomains and hostname restrictions in WHM Add DNS interface.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The WHM Add DNS interface allows a reseller to assign ownership of a DNS zone to a specific cPanel account. This interface did not enforce DNS zone restrictions against the use of the server’s hostname or domains listed in the commondomains file. Resellers with the “create-dns” ACL could leverage this behavior to bypass these restrictions.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Multiple Cases (10)

Summary

Multiple XSS vulnerabilities in various interfaces.

Description

Output filtering errors in several different interfaces allowed JavaScript inputs to be returned to the browser without proper filtering. The affected interfaces are listed below.

Case: 99353
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /scripts2/sshkeys
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 99637
Security Rating: Moderate
XSS Type: Stored
Interface: WHM
URLs: /scripts4/listaccts
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 100669
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /cgi/addrbl.cgi
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 100685
Security Rating: Important
XSS Type: Stored
Interface: WHM
URLs: /scripts/reallyemailall
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 101013
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /cgi/diskusage.cgi
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 102853
Security Rating: Minor
XSS Type: Self
Interface: WHM
URLs: /cgi/easyapache.pl
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 102877
Security Rating: Minor
XSS Type: Self
Interface: WHM
URLs: /scripts9/upload_legacy_file
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 104033
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewcrt.html, /frontend/x3/ssl/viewcrt.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: Cody Brocious

Case: 105229
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewkey.html, /frontend/x3/ssl/viewkey.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: Cody Brocious

Case: 105273
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewcsr.html, /frontend/x3/ssl/viewcsr.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

cPanel includes a comprehensive protection mechanism against XSS and XSRF attacks called Security Tokens. Security Tokens protection is enabled by default in all installs of cPanel & WHM. When Security Tokens protection is enabled, an attacker intending to utilize any self-XSS vulnerabilities must convince the victim to navigate their browser to the appropriate cPanel or WHM interface and manually input the JavaScript payload.

Credits

These issues were discovered by the respective reporters listed above.

Solution

These issues are resolved in the following builds:

11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

For the PGP-signed message, see: http://cpanel.net/wp-content/uploads/2014/07/TSR-2014-0005-Full-Disclosure.txt