cPanel TSR-2018-0005 Full Disclosure | cPanel Newsroom

cPanel is a control panel for Web Hosting Providers available here – Cloud Server cPanel. Contact us to find out our latest offers!

cPanel TSR-2018-0005 Full Disclosure

SEC-409

Summary

ClamAV daemon can be shut off by any local user.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Description

The userspace socket file for the clamd daemon has open permissions for necessary communication with userspace scanning functionality in cPanel. However, this socket also accepts the SHUTDOWN command which allowed unprivileged users to shut down the ClamAV daemon.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-428

Summary

Self-XSS in WHM ‘Create a New Account’ interface.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 4.4 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

Description

Errors encountered in the zone template during account creation did not perform context appropriate escaping. This allowed an attacker to inject arbitrary HTML into the rendered page.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-433

Summary

Self-XSS in WHM ‘Security Questions’ interface.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.7 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

Description

User supplied parameters for the WHM ‘Security Questions’ interface are displayed without context appropriate escaping. This allowed for an attacker to inject arbitrary code into the rendered page.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-434

Summary

Self-XSS in cPanel ‘Site Software Moderation’ interface.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.7 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

Description

Certain user supplied parameters displayed as part of the cPanel ‘Site Software Moderation’ interface are displayed without context appropriate escaping. This allowed an attacker to inject arbitrary code into the rendered page.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-437

Summary

Self-XSS in WHM ‘Style Upload’ interface.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.7 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

Description

When using the Customization interface in WHM, error messages displaying user-supplied input are rendered without context appropriate escaping. This allowed an attacker to inject arbitrary code into the rendered page.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-441

Summary

Actively stored XSS in WHM ‘File and Directory Restoration’ interface.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.9 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

Description

During file and directory restoration operations, a cPanel user was able to intercept json-api requests made by the WHM reseller and send back corrupted json-api responses. These corrupted API responses were displayed without appropriate escaping, allowing the cPanel user to insert HTML into the reseller’s web interface.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-444

Summary

Demo account code execution via Fileman::viewfile API.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 7.4 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

Description

When calling the Fileman::viewfile API on an RPM file, the rpm utility is called to display information about the file. Arguments are passed incorrectly to the rpm utility. This allowed for a demo account user to run arbitrary code as the demo user.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-445

Summary

Invalid email_accounts.json prevents full account suspension.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 3.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Description

When a user’s email_accounts.json file is corrupted, the suspend script generates an exception. This causes the script to fail before the full suspend process can be completed. A user could take advantage of this in order to prevent full suspension of their account.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-446

Summary

Self-Stored XSS on ‘Security Questions’ login page.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 4.4 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N

Description

A reseller with ‘all’ privileges can set security questions and answers for verification when logins occur from an unrecognized IP address. These questions and answers are displayed without context appropriate escaping, which allowed an attacker to inject arbitrary code into the rendered page.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-447

Summary

Arbitrary file write as root in WHM ‘Force Password Change’.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 7.4 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H

Description

A recent refactoring in the WHM ‘Force Password Change’ subsystem caused a user-controlled file to be written to with root’s effective permissions. This allowed an attacker to overwrite arbitrary files on the system.

Credits

This issue was discovered by rack911labs.com.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

SEC-449

Summary

FTP access allowed during account suspension.

Security Rating

cPanel has assigned this vulnerability a CVSSv3 score of 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Description

When the system was configured with ProFTPd as the FTP daemon, suspending a cPanel account did not disable FTP access for the account.

Credits

This issue was discovered by Harry Li from GoDaddy.

Solution

This issue is resolved in the following builds:
74.0.8
70.0.57

For the PGP-Signed version of this announcement please see: https://news.cpanel.com/wp-content/uploads/2018/09/TSR-2018-0005.disclosure.signed.txt

cPanel is a control panel for Web Hosting Providers available here – Cloud Server cPanel. Contact us to find out our latest offers!

Comments are closed.

>
%d bloggers like this: