Type: Insecure File Permissions
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199 & 188.8.131.52
cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.
When an account is being transferred over from a remote erver, it is temporarily stored under the /home directory with 644 file persmissions that could allow an attacker to make a copy of it thus obtaining data belonging to the other account.
It would be trivial for an attacker to run a cron job that looks for a certain process running that divulges the username of an account currently being transferred over to automate the whole process of stealing the data.
Proof of Concept:
Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.
We have deemed this vulnerability to be rated as MEDIUM due to the fact that any transferred account can have it’s data stolen.
This vulnerability was tested against cPanel 184.108.40.206 and is believed to exist in all versions prior to the fixed builds below.
This vulnerability was patched in cPanel 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199 & 188.8.131.52.
Vendor Contact Timeline:
2013-07-17: Vendor contacted via email.
2013-08-27: Vendor confirms vulnerability.
2013-08-27: Vendor issues updates to all builds.
2013-08-29: Rack911 issues security advisory.