cPanel – DNS Zone Common Domain Restriction Bypass (R911-0153)

Type: Input Validation Failure
Location: Remote
Impact: High
Product: cPanel
Website: http://www.cpanel.net
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 11.43.0.12, 11.42.1.16 & 11.40.1.14
CVE: -
R911: 0153
Date: 2014-05-26
By: Rack911

Product Description:

cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.

Vulnerability Description:

Due to an input validation failure, it is possible for a malicious user to create a DNS zone such as Hotmail.com or Google.com, bypassing the common domain restriction, which could then be used by the attacker to redirect mail delivery and intercept messages.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that email intended for certain remote domains could be hijacked.

Vulnerable Version:

This vulnerability was tested against cPanel prior to the fixed versions below.

Fixed Version:

This vulnerability was patched in cPanel 11.43.0.12, 11.42.1.16 & 11.40.1.14.

Vendor Contact Timeline:

2014-04-09: Vendor contacted via email.
2014-04-14: Vendor confirms vulnerability.
2014-05-19: Vendor issues updates to all builds.
2014-05-26: Rack911 issues security advisory.