{"id":18698,"date":"2021-11-16T23:10:30","date_gmt":"2021-11-16T20:10:30","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=59889"},"modified":"2021-11-29T14:58:38","modified_gmt":"2021-11-29T11:28:38","slug":"cpanel-tsr-2021-0006-full-disclosure","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cpanel-tsr-2021-0006-full-disclosure\/","title":{"rendered":"cPanel TSR 2021-0006 Full Disclosure"},"content":{"rendered":"<p dir=\"ltr\">cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. These builds are currently available to all customers via the standard update system.<\/p>\n<p dir=\"ltr\"><strong>SEC-592<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Arbitrary code execution via install_locallib_loginprofile script.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.9 CVSS:3.1\/AV:L\/AC:H\/PR:L\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">The install_locallib_loginprofile script checks for optional modules within the current working directory if they are missing from the local system. If these modules are missing, it is possible for an attacker to execute arbitrary code when this script is executed.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-593<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Cpanel::SecureDownload executes shell commands in an insecure manner.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 2.3 CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:C\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">It is possible for Cpanel::SecureDownload to execute shell commands in an insecure manner. This can allow for an attacker to inject arbitrary commands to be executed on the target server.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-597<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Self-Reflected-XSS Vulnerability in ModSecurity Custom Rules Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 1.8 CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">When adding rules in the ModSecurity Custom Rules Interface, error messages are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by John Lightsey.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-598<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Stored-XSS Vulnerability in ModSecurity Rules Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.1 CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">When enabling rules in the ModSecurity Rules Interface, status messages are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by John Lightsey.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-599<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Stored-XSS Vulnerability in ModSecurity Rules Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.1 CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">When disabling rules in the ModSecurity Rules Interface, status messages are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by John Lightsey.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-600<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Reflected-XSS Vulnerability in ModSecurity Vendors Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 3.1 CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:R\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">Errors generated by the ModSecurity Vendors Interface when adding a ModSecurity Vendor are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by John Lightsey.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-602<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Self-XSS Vulnerability in WHM Change Hostname interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 2.0 CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">The WHM Change Hostname interface does not adequately encode error messages. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-603<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Self-stored XSS Vulnerability in WHM Edit Reseller Nameservers and Privileges.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 2.3 CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:C\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">The WHM Edit Reseller Nameservers and Privileges interface does not adequately encode package names. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-604<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Self-XSS Vulnerability in cPanel Default Address Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 5.3 CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">Errors returned in the cPanel Default Address Interface are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.100.0.3<br \/>\n11.98.0.12<\/p>\n<p dir=\"ltr\"><strong>SEC-606<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Sensitive data submitted via GET request in scripts2\/dogencrt.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of Severity: 2.3 CVSS:3.1\/AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:L\/I:N\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">When generating an SSL certificate via the WHM Generate an SSL Certificate and Signing Request interface, the certificate\u2019s passphrase was being submitted via a GET request. This could make it possible for an attacker to recover this sensitive information from log files or browser history.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\"><strong>SEC-608<\/strong><\/p>\n<p dir=\"ltr\">Summary<\/p>\n<p dir=\"ltr\">Stored-XSS Vulnerability in ModSecurity Rules Interface.<\/p>\n<p dir=\"ltr\">Security Rating<\/p>\n<p dir=\"ltr\">cPanel has assigned this vulnerability a CVSSv3.1 score of 2.3 CVSS:3.1\/AV:L\/AC:H\/PR:H\/UI:R\/S:C\/C:N\/I:L\/A:N<\/p>\n<p dir=\"ltr\">Description<\/p>\n<p dir=\"ltr\">When deleting rules in the ModSecurity Rules Interface, status messages are not adequately encoded. This could allow for an attacker to execute arbitrary code on the rendered page.<\/p>\n<p dir=\"ltr\">Credits<\/p>\n<p dir=\"ltr\">This issue was discovered by the cPanel Security Team.<\/p>\n<p dir=\"ltr\">Solution<\/p>\n<p dir=\"ltr\">This issue is resolved in the following builds:<br \/>\n11.94.0.18<br \/>\n11.98.0.12<br \/>\n11.100.0.3<\/p>\n<p dir=\"ltr\">For the PGP-Signed message please see the linked document below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel &amp; WHM product. These builds are currently available to all customers via the standard update system. SEC-592 Summary Arbitrary code execution via install_locallib_loginprofile script. Security Rating cPanel has assigned this vulnerability a CVSSv3.1 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-18698","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/18698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=18698"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/18698\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=18698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=18698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=18698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}