cPanel – Account Suspension Manipulation (R911-0053)

Type: Account Suspension Manipulation
Location: Local
Impact: Medium
Product: cPanel
Website: http://www.cpanel.net
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 11.39.0.15, 11.38.2.6, 11.36.2.3, 11.34.2.4 & 11.32.7.3
CVE: -
R911: 0053
Date: 2013-08-29
By: Rack911

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

There is a flaw within the un-suspend function of WHM that allows a reseller to activate any email and/or webdav (web disk) account on the server that was suspended.

Proof of Concept:

Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.

Impact:

We have deemed this vulnerability to be rated as MEDIUM due to the fact that email and/or webdav accounts can be un-suspended, however, the attacker must know the target username.

Vulnerable Version:

This vulnerability was tested against cPanel 11.38.2.2 and is believed to exist in all versions prior to the fixed builds below.

Fixed Version:

This vulnerability was patched in cPanel 11.39.0.15, 11.38.2.6, 11.36.2.3, 11.34.2.4 & 11.32.7.3.

Vendor Contact Timeline:

2013-08-01: Vendor contacted via email.
2013-08-27: Vendor confirms vulnerability.
2013-08-27: Vendor issues updates to all builds.
2013-08-29: Rack911 issues security advisory.