{"id":15368,"date":"2021-01-20T09:00:15","date_gmt":"2021-01-20T06:00:15","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=59005"},"modified":"2021-01-20T09:00:15","modified_gmt":"2021-01-20T06:00:15","slug":"cpanel-tsr-2021-0001-full-disclosure","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cpanel-tsr-2021-0001-full-disclosure\/","title":{"rendered":"cPanel TSR-2021-0001 Full Disclosure"},"content":{"rendered":"<p class=\"ui-sortable-handle\" style=\"text-align: left;\">cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. These builds are currently available to all customers via the standard update system.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">cPanel has rated these updates as having CVSSv3.1 scores ranging from 2.5 to 3.3.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">Information on cPanel\u2019s security ratings is available at\u00a0<a href=\"https:\/\/go.cpanel.net\/securitylevels\" target=\"_blank\" rel=\"noopener\">https:\/\/go.cpanel.net\/securitylevels<\/a>.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">If your deployed cPanel &amp; WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel &amp; WHM installations at your earliest convenience.<\/p>\n<h2 id=\"CopyofcPanelTSR20210001FullDisclosure-SEC-578\" class=\"ui-sortable-handle\" style=\"text-align: left;\">SEC-578<\/h2>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Summary<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">Reseller suspension lock bypass.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Security Rating<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.3 CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Description<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">It is possible to suspend an already suspended account via the WHM API. This can allow for an attacker to re-suspend and then unsuspend an account suspension-locked by the root user.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Credits<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">This issue was discovered by the cPanel Security Team.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Solution<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">This issue is resolved in the following builds:<br \/>\n11.92.0.9<br \/>\n11.86.0.36<\/p>\n<h2 id=\"CopyofcPanelTSR20210001FullDisclosure-SEC-579\" class=\"ui-sortable-handle\" style=\"text-align: left;\">SEC-579<\/h2>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Summary<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">MySQL user suspension fails with old-style password hashes.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Security Rating<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">cPanel has assigned this vulnerability a CVSSv3.1 score of 2.5 CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:L<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Description<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">When suspending a MySQL user with old-style password hashes on a MySQL 5.5 system, suspendacct would fail to disable the passwords. This allowed access to the databases to remain active.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Credits<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">This issue was discovered by the cPanel Security Team.<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\"><strong>Solution<\/strong><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">This issue is resolved in the following builds:<br \/>\n11.92.0.9<br \/>\n11.86.0.36<\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">For information on cPanel &amp; WHM Versions and the Release Process, read our documentation at:\u00a0<a href=\"https:\/\/go.cpanel.net\/versionformat\" target=\"_blank\" rel=\"noopener\">https:\/\/go.cpanel.net\/versionformat<\/a><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: left;\">For the PGP-Signed message please see\u00a0<a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2021\/01\/TSR-2021-0001.announcement.signed.txt\" target=\"_blank\" rel=\"noopener\">the linked document here.<\/a><\/p>\n<p class=\"ui-sortable-handle\" style=\"text-align: right;\">\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv3.1 scores ranging from 2.5 to 3.3. Information on cPanel\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-15368","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/15368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=15368"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/15368\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=15368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=15368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=15368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}