Administrator Posted August 30, 2013 Posted August 30, 2013 TSR-2013-0009 Detailed Disclosure The following disclosure covers Targeted Security Release TSR-2013-0009, that was published on August 27th, 2013.Each vulnerability is assigned an internal case number which is reflected below.Information regarding the cPanel Security Level rankings can be found here: http://go.cpanel.net/securitylevels Case 73377 SummaryAn account’s cpmove archives were world-readable in the /home directory with 644 permissions during packaging. Security RatingcPanel has assigned a Security Level of Moderate to this vulnerability. DescriptionThe cPanel and WHM account transfer process created a temporary cpmovearchive in the /home directory with 644 permissions. This allowed a localattacker to read the private contents of another user’s home directoryand configuration settings while the transfer operation was in progress.The world-readable cpmove file was left accessible for a longer periodof time when the account transfer process failed and required manual intervention. CreditsThis issue was reported by Rack911.com. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 73581 SummaryThe improper sanitization of user input when adding an Addon Domain could allow a local DoS of the web server. Security RatingcPanel has assigned a Security Level of Important to this vulnerability. DescriptionWhile creating a new Addon domain, a cPanel user account could specify aDocumentRoot for the new addon that would be misinterpreted by Apache asa nonsensical httpd.conf directive. This vulnerability could be used bya malicious local attacker to corrupt the global httpd.conf file andmake it impossible to restart the Apache web server. CreditsThis issue was reported by Rack911.com. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 73605 SummaryThe account rearrange feature of WHM could be used in an unsafe way, potentially leading to a compromise of a system’s security. Security RatingcPanel has assigned a Security Level of Moderate to this vulnerability. DescriptionWHM resellers with the “Rearrange Accounts” ACL could change thepermissions on arbitrary file paths by moving accounts theycontrolled into sensitive filesystem locations and invoke otherautomated systems, which assumed these locations were not under any useraccount’s control. The “Rearrange Accounts” ACL is a part of the a “Super Privs” ACL group,which restricts access to WHM operations that may be used to bypass many normal Reselleraccess restrictions. CreditsThis issue was reported by Rack911.com SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & GreaterPlease update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 73773 SummarycPanel, WHM and Webmail session files contained plaintext passwords. Security RatingcPanel has not assigned a Security Level to this issue as we feel this is only a hardening measure. DescriptionThe session files in /var/cpanel/sessions contained plain text passwords for recently logged in users. The session files were correctly secured so that only the root account on the system could read their contents. We have added additional obfuscation of the plaintext passwords, so that any attacker who compromises the root account on the system will not have the ability to reconstruct the plaintext passwords from the session files. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 74521 SummaryResellers with the locale-edit ACL could overwrite any file on the system. Security RatingcPanel has assigned a Security Level of Important to this vulnerability. DescriptionResellers that were able to install locale data from uploaded XML files could overwrite any fileon the disk with data provided in the XML file. This could be used to gain privilege escalation to root. CreditsThis issue was reported by Rack911.com. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 75569 SummaryThe unsuspend function makes changes to webDAV user files that could unsuspend a suspended user on the system. Security RatingcPanel has assigned a Security Level of Important to this vulnerability. DescriptionThe process of unsuspending a suspended account did not perform proper checks on the ownership and location of the virtual account password files. This flaw allowed a malicious reseller account with the “(Un)Suspend” ACL to unsuspend arbitrary accounts on the system. CreditsThis issue was reported by Rack911.com. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Cases 68205, 71701, 71705, 71709, 71721, 71725, 71733, 75169, 75413, 75417, and 75605 Summary Multiple vulnerabilities in the cPAddons Site Software subsystem. Security RatingcPanel has assigned a range of Security Levels to these vulnerablities from Minor to Important. DescriptionThe cPAddons Site Software subsystem provides a suite of web applicationsoftware that individual cPanel user accounts may install into theirdomains. The subsystem also provides interfaces in WHM where the root usermay configure the list of web applications that are available forinstallation, configure which web applications require root’s approvalfor installation, and perform the installation of moderated cPAddons. This subsystem was vulnerable to a variety of attacks by malicious localcPanel accounts and malicious WHM reseller accounts. The vulnerabilitiesincluded flaws in the ACL enforcement logic of the WHM interfaces thatallowed non-root resellers to use the WHM interfaces and stored XSSattacks that a cPanel account could conduct against the root user. Themoderated cPAddons install logic included further vulnerabilities thatwould allow a malicious cPanel user to execute arbitrary code as anyother account on the system. CreditsThese issues were discovered by the cPanel Security Team. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 71265 SummaryThe autoresond.pl script was vulnerable to shell injection. Security RatingcPanel has assigned a Security Level of Moderate to this vulnerability. DescriptionThe cPanel autorespond script is used by cPanel and Webmail accounts tosend vacation notices when the user is unavailable to answer theiremail. An input sanitization flaw in this script allowed a maliciouslocal cPanel account to bypass other account restrictions, suchas jailshell, while executing arbitrary code. CreditsThis issue was discovered by the cPanel Security Team. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & GreaterThis issue was not introduced into the autoresponder.pl code until 11.38, 11.36 and prior are not vulnerable.Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Cases 74609 and 75113 SummaryThe NVData module lacked proper sanitization, which allowed overwrites of files and path traversal. Security RatingcPanel has assigned a Security Level of Minor to this vulnerability. DescriptionThe WHM interface uses an NVData subsystem to persistently store somesettings of the web interface. This subsystem did insufficientvalidation of its inputs, allowing a malicious local reseller to corruptNVData files belonging to other users and read files outside of the NVDatasubsytem. These flaws potentially allowed the reseller to changeownership and permissions settings on arbitrary files. CreditsThis issue was discovered by the cPanel Security Team. SolutionThis issue is resolved in the following builds:* 11.39.0.15 & Greater* 11.38.2.6 & Greater* 11.36.2.3 & Greater* 11.34.2.4 & Greater* 11.32.7.3 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Our GPG key is available at: http://go.cpanel.net/gnupgkeys (ABD94DDF) The cPanel Security Team can be contacted at: security@cpanel.net TSR-2013-0009-DetailedDisclosure View the full article
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now