Newsroom

IMPORTANT: cPanel Security Notice 2013-06-03

SUMMARY

The Apache mod_rewrite module fails to sanitize input, which may lead to arbitrary command execution in some circumstances.

SECURITY RATING

The cPanel Security Team has rated this update has having critical security impact.

Information on security ratings is available at: http://go.cpanel.net/securitylevels. You are strongly encouraged to run EasyApache and update your Apache installation at your earliest convenience.

DETAIL

From CVE-2013-1862: “It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user.”

AFFECTED VERSIONS

All versions of Apache 2.2 and 2.4.

SOLUTION

cPanel, Inc has released EasyApache 3.18.16 to correct this issue. To update, rebuild your EasyApache profile. For more information on rebuilding profiles, please consult our documentation (http://go.cpanel.net/ea)

RELEASES

EasyApache v3.18.16 addresses all known vulnerabilities.

Unless EasyApache updates are disabled on your system, the latest version of EasyApache will be used whenever EasyApache is run. Note that EasyApache updates must be done manually.

REFERENCES

* CVE-2013-1862 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862)
* CVSSv2: (AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)
* RHSA-2013:0815 (http://rhn.redhat.com/errata/RHSA-2013-0815.html)
* Apache Patch: http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch

For the PGP Signed message, please go here