Archive for July, 2015

cPanel – Password Change Hardlink Arbitrary File Write (R911-0184)

Thursday, July 23rd, 2015

Type: Arbitrary File Write (Symlink)
Location: Local
Impact: Medium
Product: cPanel
Website: http://www.cpanel.net
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 11.50.0.27, 11.48.4.6 & 11.46.3.8
CVE: -
R911: 0184
Date: 2015-07-23
By: RACK911 Labs

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

It is possible for a malicious user to perform a symlink attack against any file on the server and inject (some) data into the compromised file. This is allowed to happen during the Password Change function that performs various root file operations within the user home directory.

Impact:

We have deemed this vulnerability to be rated as MEDIUM due to the fact that while we can compromise any file on the server, the data that we can write is limited which ruins the effectiveness of this exploit. However, under certain circumstances it *MAY* be possible to obtain root access.

Vulnerable Version:

This vulnerability is believed to exist in all versions prior to the fixed versions below.

Fixed Version:

This vulnerability was patched in cPanel versions 11.50.0.27, 11.48.4.6 & 11.46.3.8.

Vendor Contact Timeline:

2015-05-19: Vendor contacted via email.
2015-05-19: Vendor confirms vulnerability.
2015-07-20: Vendor issues updates to all builds.
2015-07-23: RACK911 Labs issues security advisory.

cPanel – Force Password Change Symlink Privilege Escalation (R911-0183)

Thursday, July 23rd, 2015

Type: Privilege Escalation (Symlink)
Location: Local
Impact: High
Product: cPanel
Website: http://www.cpanel.net
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 11.50.0.27, 11.48.4.6 & 11.46.3.8
CVE: -
R911: 0183
Date: 2015-07-23
By: RACK911 Labs

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

It is possible for a malicious user to perform a symlink attack against key files on the server to escalate their privileges to root access. This is allowed to happen during the Force Password Change function that performs various root file operations within the user home directory.

Note:

The cPanel advisory (intentionally) understates the severity of this vulnerability! Interactive root access can be obtained in a matter of seconds.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

Vulnerable Version:

This vulnerability is believed to exist in all versions prior to the fixed versions below.

Fixed Version:

This vulnerability was patched in cPanel versions 11.50.0.27, 11.48.4.6 & 11.46.3.8.

Vendor Contact Timeline:

2015-05-14: Vendor contacted via email.
2015-05-15: Vendor confirms vulnerability.
2015-07-20: Vendor issues updates to all builds.
2015-07-23: RACK911 Labs issues security advisory.

cPanel – Backup Symlink Privilege Escalation (R911-0182)

Thursday, July 23rd, 2015

Type: Privilege Escalation (Symlink)
Location: Local
Impact: High
Product: cPanel
Website: http://www.cpanel.net
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 11.50.0.27, 11.48.4.6 & 11.46.3.8
CVE: -
R911: 0182
Date: 2015-07-23
By: RACK911 Labs

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

It is possible for a malicious user to perform a symlink attack against key files on the server to escalate their privileges to root access. This is allowed to happen during the Generate Full Backup function that performs various root file operations within the user home directory.

Note:

The cPanel advisory (intentionally) understates the severity of this vulnerability! Interactive root access can be obtained in a matter of seconds.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact root access can be obtained.

Vulnerable Version:

This vulnerability is believed to exist in all versions prior to the fixed versions below.

Fixed Version:

This vulnerability was patched in cPanel versions 11.50.0.27, 11.48.4.6 & 11.46.3.8.

Vendor Contact Timeline:

2015-05-14: Vendor contacted via email.
2015-05-14: Vendor confirms vulnerability.
2015-07-20: Vendor issues updates to all builds.
2015-07-23: RACK911 Labs issues security advisory.

CloudLinux – CageFS Tmpwatch Arbitrary File Deletion (R911-0181)

Sunday, July 5th, 2015

Type: Arbitrary File Deletion
Location: Local
Impact: High
Product: CloudLinux
Website: http://www.cloudlinux.com
Vulnerable Version: CageFS 5.3-6
Fixed Version: CageFS 5.4-1
CVE:
R911: 0181
Date: 2015-07-05
By: RACK911 Labs

Product Description:

CloudLinux is a commercially supported Linux operating system interchangeable with CentOS. It includes kernel level technology called LVE that allows you to control CPU and memory on per tenant bases. It is a bases for application level virtualization. CloudLinux delivers advanced resource management, better security and performance optimizations specifically targeted to multi-tenant hosting environment.

Vulnerability Description:

The tmpwatch function of CloudLinux is supposed to clear out temporary files within user directories stored under CageFS. Due to the process being called through the system shell, the process ends up running as root instead of the user which can lead to arbitrary files being deleted elsewhere on the server.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that system files and other user files can be deleted.

Vulnerable Version:

This vulnerability was tested against CloudLinux CageFS 5.3-6 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in CloudLinux CageFS 5.4-1.

Special Note:

We would like to take a moment to thank the developers of CloudLinux for their always prompt updates in patching our security vulnerabilities. While we understand that no developer would like to have security vulnerabilities present, CloudLinux always takes responsibility and are some of the most dedicated developers we have interacted with. Kudos to them!

Vendor Contact Timeline:

2015-06-26: Vendor contacted via email.
2015-06-26: Vendor confirms vulnerability.
2015-07-02: Vendor issues update.
2015-07-05: RACK911 Labs issues advisory.