{"id":2772,"date":"2018-01-24T12:47:22","date_gmt":"2018-01-24T09:47:22","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=54521"},"modified":"2018-01-24T12:47:22","modified_gmt":"2018-01-24T09:47:22","slug":"cpanel-tsr-2018-0001-full-disclosure","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cpanel-tsr-2018-0001-full-disclosure\/","title":{"rendered":"cPanel TSR-2018-0001 Full Disclosure"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2018\/01\/cpanel-tsr-2018-0001-full-disclosure.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p><strong>cPanel TSR-2018-0001 Full Disclosure<\/strong><\/p>\n<p><strong>SEC-308<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>SRS secret revealed in exim.conf.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.5 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When the experimental SRS option for Exim was enabled, the secret key used to sign SRS email was visible inside the exim.conf file. This setting is now stored in a separate file that is not world-readable.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-321<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Database and dbuser names were not validated during renames.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.3 CVSS:3.0\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When renaming a database or database user via either the MySQL or PostgreSQL adminbins, the new name was not verified to meet cPanel\u2019s naming requirements. This allowed an attacker to create databases or database users with reserved or invalid names.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-324<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Ownership not enforced by addpkgext and delpkgext WHM API calls.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.7 CVSS:3.0\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>The \u201caddpkgext\u201d and \u201cdelpkgext\u201d WHM API calls did not restrict modifications to packages and accounts that the reseller was authorized to change. These API calls now restrict modifications based on package and account ownership if the reseller does not have the \u201call\u201d ACL.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<\/p>\n<p><strong>SEC-339<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Backups revealed contents of directories that the user did not own.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.8 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:C\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>During a backup it was possible to lead the process into directories that the user did not own. The file and directory paths would then be saved to a file that was readable by the user.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-342<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Root\u2019s crontab briefly world-readable when enabling backups.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.8 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When enabling backups, it is sometimes necessary to add new entries to root\u2019s crontab. To perform this change, a temporary file was created with a predictable name and world-readable permissions. This allowed the crontab to be read by normal users during this action.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-349<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Arbitrary file read via restore adminbin.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 6.5 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:H\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>Race conditions in the RESTOREFILE functionality of the restore adminbin could be misused by local attackers to read any files on the system.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<\/p>\n<p><strong>SEC-351<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Root\u2019s crontab briefly world-readable during crontab configuration.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.8 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When saving changes to root\u2019s crontab through the \u201cConfigure cPanel Cron Jobs\u201d interface in WHM, a temporary file containing root\u2019s crontab was created with world-readable permissions.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-352<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Root\u2019s crontab briefly world-readable during post update tasks.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 3.3 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>During cPanel updates, root\u2019s crontab was exposed in a world-readable temporary file by the post install task to update cPAddons.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-353<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>World-readable copy of httpd.conf created during syntax test.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.5 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>During httpd.conf updates on systems using EasyApache4, a copy of the httpd.conf file was created with world-readable permissions.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-354<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Insecure file operations in bin\/csvprocess.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.4 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:N\/I:H\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>The csvprocess script performed file operations on predictably named files in the current working directory. If this script was run by the root user in a user-controlled directory, it was possible for an attacker to cause root owned files to be overwritten. This script has been removed and its functionality moved into the API call that previously utilized this script.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-355<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>World-readable archive created by archive_sync_zones script.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.8 CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:R\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When scripts\/archive_sync_zones generated a backup file, the resulting archive was created with world-readable permissions.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-356<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Limited arbitrary file write via telnetcrt script.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.4 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:N\/I:H\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>The telnetcrt script attempted to change directory to a safe location to write temporary files without verifying the directory existed or that the change of directory was successful. If this script was run manually in a world-writable directory, a local attacker could symlink the temporary filenames to unsafe locations. This script is no longer used by cPanel and has been removed.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by rack911labs.com.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-383<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Self-XSS in cPanel Backup Restoration.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.7 CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When rendering the list of files that are restored from a partial backup, appropriate HTML escaping was not performed. This allowed arbitrary code to be injected into the rendered page.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by Fabian Patrik of https:\/\/websafe.hu.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-385<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Self-XSS in WHM Apache Configuration Include Editor.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.7 CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When rendering invalid syntax after saving new Apache includes, the context appropriate escaping was not performed. This allowed arbitrary code to be injected into the rendered page.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by Fabian Patrik of https:\/\/websafe.hu.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-386<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Self-Stored-XSS in WHM Account Transfer.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.7 CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>Account usernames were not properly HTML escaped in the transfer log header when using the Remote User Account Transfer interface in WHM. This allowed arbitrary code to be injected into the rendered page.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by Fabian Patrik of https:\/\/websafe.hu.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-387<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Self-XSS in WHM Spamd Startup Config.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.7 CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When saving spamd directives in WHM Spamd Startup Config, invalid configuration values were displayed without appropriate HTML escaping. This allowed arbitrary code to be injected into the rendered page.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by Fabian Patrik of https:\/\/websafe.hu.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-388<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>World-readable files created when using WHM Apache Includes Editor.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 2.2 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:L\/I:N\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>When modifying the Apache Includes via the WHM Apache Includes Editor, the new configuration is created with world-readable permissions. This allowed for this configuration to be viewed by non-privileged users.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p><strong>SEC-389<\/strong><\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>Self-XSS in WHM listips interface.<\/p>\n<p><strong>Security Rating<\/strong><\/p>\n<p>cPanel has assigned this vulnerability a CVSSv3 score of 4.7 CVSS:3.0\/AV:N\/AC:H\/PR:N\/UI:R\/S:C\/C:L\/I:L\/A:N<\/p>\n<p><strong>Description<\/strong><\/p>\n<p>The WHM \/scripts2\/listips interface did not escape user input and backend error messages when displaying javascript notices.<\/p>\n<p><strong>Credits<\/strong><\/p>\n<p>This issue was discovered by the cPanel Security Team.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>This issue is resolved in the following builds:<br \/>68.0.27<br \/>66.0.35<br \/>62.0.39<\/p>\n<p>For the PGP-Signed version of this announcement please see: <a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2018\/01\/TSR-2018-0001.disclosure.signed.txt\" target=\"_blank\" rel=\"noopener\">https:\/\/news.cpanel.com\/wp-content\/uploads\/2018\/01\/TSR-2018-0001.disclosure.signed.txt<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel TSR-2018-0001 Full Disclosure SEC-308 Summary SRS secret revealed in exim.conf. Security Rating cPanel has assigned this vulnerability a CVSSv3 score of 2.5 CVSS:3.0\/AV:L\/AC:H\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N Description When the experimental SRS option for Exim was enabled, the secret key used to sign SRS email was visible inside the exim.conf file. This setting is now stored in a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-2772","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/2772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=2772"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/2772\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=2772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=2772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=2772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}