Administrator Posted July 18, 2013 Posted July 18, 2013 The following disclosure covers the TSR-2013-008, the Targeted SecurityRelease published on July 15th, 2013. Each vulnerability is assigned aninternal case number which is reflected below. Information regardingthe cPanel Security Level rankings can be found here:http://go.cpanel.net/securitylevels Case 71121 Summary The Squirrelmail Webmail session file contained plain text passwords. Security Rating cPanel has assigned a Security Level of Minor to this vulnerability. Description cPanel includes the SquirrelMail Webmail suite as one option forWebmail accounts to access their email using a web browser. Theincluded copy of SquirrelMail stored the password used to authenticatein a cleartext format in its session files. The session files arestored in the /tmp/ directory with with 0600 (rw——-) permissions,limiting access to the plaintext passwords to the system user account. Credits This issue was discovered by Alex Kwiecinski of the Liquid Web SecurityTeam. Solution This issue is resolved in the following builds: * 11.39.0.5 & Greater * 11.38.1.13 & Greater * 11.36.1.15 & Greater * 11.34.1.25 & Greater * 11.32.6.17 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found athttp://httpupdate.cpanel.net/. Case 72157 Summary Arbitrary File Modification vulnerability when suspending an account. Security Rating cPanel has assigned a Security Level of Important to thisvulnerability. Description cPanel & WHM includes functionality to automatically suspend cPanelaccounts that consume more than their allotted limits of disk andbandwidth resources. The account suspension process makes severalchanges inside the suspended user account’s home directory. It wasdiscovered that manipulations of virtual account password files thatare stored inside the user’s home directory were performed with theeffective permissions of the root user and without sufficientprotections against tampering. This allowed a local attacker whoseaccount was being suspended to manipulate sensitive files outside oftheir home directory. Credits This issue was discovered by Rack911. Solution This issue is resolved in the following builds: * 11.39.0.5 & Greater * 11.38.1.13 & Greater * 11.36.1.15 & Greater * 11.34.1.25 & Greater * 11.32.6.17 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 71573 Summary A reseller account with clustering privileges can modify any DNS zoneon the system. Security Rating cPanel has assigned a Security Level of Important to this vulnerability Description cPanel & WHM includes a DNS clustering system called DNSAdmin thatallows DNS changes to propagate beyond the local system. This systemfunctions through specific URLs inside WHM that are accessible only toreseller accounts with the “clustering” privilege. The URLs in cpsrvdthat handle DNSAdmin cluster requests were not enforcing local zoneownership correctly, allowing a malicious reseller with the clusteringprivilege to send updates for DNS zones that did not belong to hisaccounts. Credits This issue was discovered by Rack911. Solution This issue is resolved in the following builds: * 11.39.0.5 & Greater * 11.38.1.13 & Greater * 11.36.1.15 & Greater * 11.34.1.25 & Greater * 11.32.6.17 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/. Case 71625 Summary A reseller account with park-dns privileges can take control of anydomain on the system. Security Rating cPanel has assigned a Security Level of Important to this vulnerability Description WHM allows resellers with the “park-dns” ACL to assign ownership of aparked domain from one cPanel account to another. This functionalitywas not checking that the domain being reassigned belonged to anaccount the reseller controlled. A malicious reseller account with the“park-dns” ACL could use this flaw to take control of any other domainson the system. Credits This issue was discovered by Rack911. Solution This issue is resolved in the following builds: * 11.39.0.5 & Greater * 11.38.1.13 & Greater * 11.36.1.15 & Greater * 11.34.1.25 & Greater * 11.32.6.17 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/ Case 71577 Summary The Purchase and Install an SSL Certificate (Trustwave) feature doesnot drop privileges during certificate file creation. Security Rating cPanel has assigned a Security Level of Important to this vulnerability Description The WHM “Purchase and Install an SSL Certificate” page allows reselleraccounts with the “ssl” or “ssl-buy” ACLs to purchase SSL certificatesfrom Trustwave for installation on the local system. This interfacefailed to drop privileges before creating a file in the reseller’s homedirectory, allowing malicious resellers with appropriate ACLs tooverwrite arbitrary files on the system. Credits This issue was discovered by Rack911. Solution This issue is resolved in the following builds: * 11.39.0.5 & Greater * 11.38.1.13 & Greater * 11.36.1.15 & Greater * 11.34.1.25 & Greater * 11.32.6.17 & Greater Please update your cPanel & WHM system to one of the aforementionedversions or the latest public release available. A full listing ofpublished versions can always be found at http://httpupdate.cpanel.net/ For a PGP signed version, please go here. View the full article
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now