{"id":12514,"date":"2019-04-24T18:58:17","date_gmt":"2019-04-24T18:58:17","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=56605"},"modified":"2019-04-24T18:58:17","modified_gmt":"2019-04-24T18:58:17","slug":"cpanel-tsr-2019-0002-full-disclosure%ef%bb%bf","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cpanel-tsr-2019-0002-full-disclosure%ef%bb%bf\/","title":{"rendered":"cPanel TSR-2019-0002 Full Disclosure\ufeff"},"content":{"rendered":"<div><img decoding=\"async\" class=\"ff-og-image-inserted\" src=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2017\/01\/og-cPnews-1.jpg\" alt=\"\" title=\"\"><\/div>\n<p>Yesterday <a href=\"https:\/\/news.cpanel.com\/tsr-2019-0002-announcement\/\" target=\"_blank\" rel=\"noopener\">cPanel released<\/a> new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. Below is the full disclosure of the changes included in that update.<\/p>\n<p>Information on cPanel\u2019s security ratings is available at\u00a0<a href=\"https:\/\/go.cpanel.net\/securitylevels\" target=\"_blank\" rel=\"noopener\">https:\/\/go.cpanel.net\/securitylevels<\/a>.<\/p>\n<p>If your deployed cPanel &amp; WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel &amp; WHM installations at your earliest convenience.<\/p>\n<p><strong>SEC-477<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nUnsafe file operations as root in SSL certificate storage.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 5.6 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:C\/C:H\/I:N\/A:N<br \/>\n<strong>Description<\/strong><br \/>\nThe Cpanel::SSL::Objects::Certificate::File\u00a0module creates a cache file when opening and reading an SSL certificate file. The Cpanel::SSLStorage\u00a0module uses this to perform operations on SSL certificates stored in the user\u2019s home directory as root. Because of this, it was possible for an attacker to overwrite and\/or read root-owned files.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-479<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nLocal root via\u00a0userdata\u00a0cache\u00a0mis-parsing.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 7.8 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:C\/C:H\/I:H\/A:H<br \/>\n<strong>Description<\/strong><br \/>\nThe\u00a0userdata\u00a0cache uses a custom delimiter separated format using \u201c==\u201c as the delimiter. It is possible for the values in this file to contain this delimiter when written. When reading back this file, it is possible to cause other subsystems on the server into reading, writing,\u00a0chmoding, and executing arbitrary files as root.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-480<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nCode execution via\u00a0addforward\u00a0API1 call.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 7.3 CVSS:3.0\/AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:L\/A:L<br \/>\n<strong>Description<\/strong><br \/>\nThe\u00a0addforward\u00a0API1 call modified the destination email address after validating that it did not include prohibited EXIM redirect router values. This behavior could be abused by webmail virtual accounts to run arbitrary code on the cPanel server.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-481<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nUnsafe terminal capabilities determination using infocmp.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 2.5 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:L\/A:N<br \/>\n<strong>Description<\/strong><br \/>\nWhen generating formatted\/colored text, the\u00a0infocmp\u00a0binary is called as root, which reads compiled\u00a0terminfo\u00a0files as root. This binary has\u00a0its\u00a0home directory set to \/tmp. It was possible for a user to manipulate the\u00a0terminfo\u00a0files that\u00a0infocmp\u00a0processed.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-483<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nOpen mail relay due to faulty domain redirect routing.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 4.3 CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N<br \/>\n<strong>Description<\/strong><br \/>\nThe EXIM configuration used for domain forwarders did not correctly escape the final destination address. This could be abused by unauthenticated remote attackers to relay email through the server.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-484<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nLimited file read as root via EXIM virtual_user_spam router.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 3.8 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:N\/A:N<br \/>\n<strong>Description<\/strong><br \/>\nThe EXIM configuration used for routing spam email addressed to virtual email account did not correctly escape the final destination address. This could be abused by cPanel accounts to read files on the system that were inaccessible to the cPanel user.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-487<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nDemo account code execution via securitypolicy.cgi.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 7.4 CVSS:3.0\/AV:N\/AC:L\/PR:L\/UI:N\/S:C\/C:L\/I:L\/A:L<br \/>\n<strong>Description<\/strong><br \/>\nThe\u00a0securitypolicy.cgi exists in the main\u00a0docroot\u00a0for cPanel and\u00a0Webmail,\u00a0and can be accessed by normal users. A user can supply POST data to this script that contains both security context and form data. This could be used to write arbitrary data to a demo account\u2019s\u00a0docroot.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p><strong>SEC-493<\/strong><\/p>\n<p><strong>Summary<\/strong><br \/>\nRemote Stored XSS Vulnerability in BoxTrapper Queue Listing.<br \/>\n<strong>Security Rating<\/strong><br \/>\ncPanel has assigned this vulnerability a CVSSv3 score of 6.1 CVSS:3.0\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<br \/>\n<strong>Description<\/strong><br \/>\nThe BoxTrapper_showqueue() API call provides a listing of email messages currently in the BoxTrapper queue. Subject headers displayed in this listing are HTML encoded before they are MIME decoded. This allowed for an attacker to inject arbitrary code into the displayed subject.<br \/>\n<strong>Credits<\/strong><br \/>\nThis issue was discovered by the cPanel Security Team.<br \/>\n<strong>Solution<\/strong><br \/>\nThis issue is resolved in the following builds:78.0.1876.0.2170.0.67<\/p>\n<p>For the PGP-signed message, please see:\u00a0<a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2019\/03\/TSR-2019-0002.disclosure.signed.txt\" target=\"_blank\" rel=\"noopener\">TSR-2019-0002 Full Disclosure<\/a><\/p>\n<p>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday cPanel released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. Below is the full disclosure of the changes included in that update. Information on cPanel\u2019s security ratings is available at\u00a0https:\/\/go.cpanel.net\/securitylevels. If your deployed cPanel &amp; WHM servers are configured to &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-12514","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/12514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=12514"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/12514\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=12514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=12514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=12514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}