Newsroom

cPanel TSR-2016-0004 Full Disclosure

cPanel TSR-2016-0004 Full Disclosure

SEC-130

Summary

Apache logfiles start with loose permissions.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 2.1 (AV:L/AC:L/Au:S/C:P/I:N/A:N)

Description

The Apache domlogs were originally populated with loose permissions during creation.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27
11.54.0.26
11.52.6.2

SEC-133

Summary

WHM ‘Purchase and Install an SSL Certificate’ page lists all server domains.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 3.5 (AV:N/AC:M/Au:S/C:P/I:N/A:N)

Description

Under the WHM ‘Purchase and Install an SSL Certificate’ page, resellers could view all domains present on the server, rather than just those that they own. This could be used for domain name enumeration.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27

SEC-134

Summary

File ownership change to ‘nobody’ via rearrangeacct.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 3.6 (AV:N/AC:H/Au:S/C:P/I:P/A:N)

Description

The method used to re-assign ownership of files to the ‘nobody’ user in rearrangeacct was subject to a time-of-check/time-of-use vulnerability. It was possible for an attacker to take limited advantage of this to cause the ownership of a file to be assigned to the ‘nobody’ user.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27

SEC-137

Summary

Set the pear tmp directory during php install.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 1.0 (AV:L/AC:H/Au:S/C:N/I:P/A:N)

Description

When pear is installed, the default tmp directory was under /tmp. Other RPM’s use pear and write predictable tmp files. The tmp directory was moved to /root to prevent anyone from tampering with these files.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27
11.54.0.26
11.52.6.2

SEC-138

Summary

Demo mode breakout via Site Templates and Boxtrapper API calls.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Description

Using a combination of the Site Templates and Boxtrapper API calls, it was possible to create a php file and have it placed in the account’s home directory. This allowed for an attacker to break out of a demo mode account.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27

SEC-139

Summary

Improper session handling for shared users.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Description

The session storage location for the shared PHP web applications that run under cpsrvd was misconfigured. This allowed certain types of PHP object injection attacks.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27
11.54.0.26

SEC-142

Summary

Code execution as other user accounts through the PHP CGI handler.

Security Rating

cPanel has assigned this vulnerability a CVSSv2 score of 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P)

Description

Under some configurations the CGI PHP handler would execute PHP scripts as the wrong user and group.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.58.0.4
11.56.0.27
11.54.0.26
11.52.6.2

For the PGP-Signed version of this document please visit https://news.cpanel.com/wp-content/uploads/2016/07/TSR-2016-0004.disclosure.txt