We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on the cPanel Community Forums, Discord, or Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.
This release includes a security patch that has been issued a fix for a CVE (Common Vulnerabilities and Exposures), the details of which are included below.
SUMMARY
cPanel, L.L.C. has updated packages for EasyApache 4 with ModSecurity version 2.9.6, OWASP ModSecurity Rule Set (CRS) version 3.3.4, and Ruby version 2.7.7. This release addresses vulnerabilities related to CVE-2022-39955, CVE-2022-39956, CVE-2022-39957, CVE-2022-39958, and CVE-2021-33621. We strongly encourage all ModSecurity users to update to version 2.9.6, all OWASP CRS users to update to version 3.3.4, and all Ruby users to update to version 2.7.7.
AFFECTED VERSIONS
All versions of ModSecurity through 2.9.5.
All versions of OWASP CRS through 3.3.3.
All versions of Ruby through 2.7.6.
SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:
CVE-2022-39955 – CRITICAL
OWASP CRS 3.3.4
Fixed vulnerability related to CVE-2022-39955.
CVE-2022-39956 – CRITICAL
ModSecurity 2.9.6
Fixed vulnerability related to CVE-2022-39956.
OWASP CRS 3.3.4
Fixed vulnerability related to CVE-2022-39956.
CVE-2022-39957 – HIGH
OWASP CRS 3.3.4
Fixed vulnerability related to CVE-2022-39957.
CVE-2022-39958 – HIGH
OWASP CRS 3.3.4
Fixed vulnerability related to CVE-2022-39958.
CVE-2021-33621 – HIGH
Ruby 2.7.7
Fixed vulnerability related toCVE-2021-33621.
SOLUTION
cPanel, L.L.C. has released updated packages for EasyApache 4 on December 7, 2022, with ModSecurity version 2.9.6, OWASP ModSecurity Rule Set (CRS) version 3.3.4, and Ruby version 2.7.7. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM’s Run System Update interface.
REFERENCES
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33621
https://raw.githubusercontent.com/coreruleset/coreruleset/v3.3/master/CHANGES
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6
https://www.ruby-lang.org/en/news/2022/11/24/ruby-2-7-7-released/
https://news.cpanel.com/wp-content/uploads/2022/12/EA4-2022-12-7-CVE.signed.txt