{"id":17445,"date":"2021-09-22T01:01:26","date_gmt":"2021-09-21T22:01:26","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=59725"},"modified":"2021-09-28T08:44:30","modified_gmt":"2021-09-28T05:14:30","slug":"cpanel-tsr-2021-0005-full-disclosure","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cpanel-tsr-2021-0005-full-disclosure\/","title":{"rendered":"cPanel TSR-2021-0005 Full Disclosure"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: left;\">cPanel has released its\u00a0Targeted Security Release to address security concerns with the cPanel product.\u00a0These updates are currently available to all customers via the standard update system.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">cPanel has rated this update as having a CVSSv3.1 score of\u00a0<strong>3.9 to 5.3<\/strong>. For more information on ratings, please visit\u00a0<a href=\"https:\/\/docs.cpanel.net\/knowledge-base\/security\/security-levels\/\" target=\"_blank\" rel=\"noopener\"><u>our documentation<\/u><\/a>.<\/p>\n<h2 dir=\"ltr\" style=\"text-align: left;\">Is there any action required?<\/h2>\n<p dir=\"ltr\" style=\"text-align: left;\">If you have disabled cPanel &amp; WHM automatic updates, please update your cPanel &amp; WHM installations at your earliest convenience.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">If you have configured cPanel &amp; WHM servers to automatically update, no action is required. Your servers have automatically been updated.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">To avoid service interruptions, please ensure you are on one of the following secure versions:<\/p>\n<ul dir=\"ltr\" style=\"text-align: left;\">\n<li><strong>94.0.16 or greater<\/strong><\/li>\n<li><strong>98.0.8 or greater<\/strong><\/li>\n<\/ul>\n<h2 dir=\"ltr\" style=\"text-align: left;\">Full Disclosure Details<\/h2>\n<h3 dir=\"ltr\" style=\"text-align: left;\">SEC-595<\/h3>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Summary<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Boxtrapper runs with \/tmp as the working directory.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Security Rating<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.9 CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Description<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Boxtrapper is run with \/tmp as the working directory. In combination with the CVE-2021-36770 for Perl\u2019s <a href=\"http:\/\/Encode.pm\" target=\"_blank\" rel=\"noopener\">Encode.pm<\/a>, it is possible for an attacker to execute arbitrary code as another user on the server.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Credits<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Solution<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">This issue is resolved in the following builds:<br \/>\n11.98.0.8<br \/>\n11.94.0.16<\/p>\n<h3 dir=\"ltr\" style=\"text-align: left;\">SEC-596<\/h3>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Summary<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Reflected XSS Vulnerability in Legacy Login Page.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Security Rating<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">cPanel has assigned this vulnerability a CVSSv3.1 score of 5.3 CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Description<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Invalid UTF-8 characters could trigger cPanel to use the Legacy Login page. This page did not adequately encode output. This could allow for an attacker to inject arbitrary JavaScript code into the rendered page.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Credits<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">This issue was discovered by Sh1yo.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>Solution<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">This issue is resolved in the following builds:<br \/>\n11.98.0.8<br \/>\n11.94.0.16<\/p>\n<h2 dir=\"ltr\" style=\"text-align: left;\">Additional Information<\/h2>\n<p dir=\"ltr\" style=\"text-align: left;\">For the latest information on cPanel &amp; WHM releases, please visit our\u00a0<a href=\"http:\/\/httpupdate.cpanel.net\" target=\"_blank\" rel=\"noopener\"><u>cPanel Downloads<\/u><\/a>\u00a0page.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">For more information on the cPanel &amp; WHM Versions and Release Process, please refer to\u00a0<a href=\"https:\/\/docs.cpanel.net\/knowledge-base\/cpanel-product\/product-versions-and-the-release-process\/\" target=\"_blank\" rel=\"noopener\"><u>our documentation<\/u><\/a>.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">For the PGP-Signed message please see\u00a0<a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2021\/09\/TSR-2021-0005.disclosure.signed.txt\" target=\"_blank\" rel=\"noopener\">TSR-2021-0005.disclosure.signed<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel has released its\u00a0Targeted Security Release to address security concerns with the cPanel product.\u00a0These updates are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv3.1 score of\u00a03.9 to 5.3. For more information on ratings, please visit\u00a0our documentation. Is there any action required? If you have &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-17445","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/17445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=17445"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/17445\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=17445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=17445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=17445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}