cPanel – DNS Zone Common Domain Restriction Bypass (R911-0153)

Type: Input Validation Failure
Location: Remote
Impact: High
Product: cPanel
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version:, &
CVE: -
R911: 0153
Date: 2014-05-26
By: Rack911

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

Due to an input validation failure, it is possible for a malicious user to create a DNS zone such as or, bypassing the common domain restriction, which could then be used by the attacker to redirect mail delivery and intercept messages.


We have deemed this vulnerability to be rated as HIGH due to the fact that email intended for certain remote domains could be hijacked.

Vulnerable Version:

This vulnerability was tested against cPanel prior to the fixed versions below.

Fixed Version:

This vulnerability was patched in cPanel, &

Vendor Contact Timeline:

2014-04-09: Vendor contacted via email.
2014-04-14: Vendor confirms vulnerability.
2014-05-19: Vendor issues updates to all builds.
2014-05-26: Rack911 issues security advisory.