Type: Insecure Credential Storage
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52 & 184.108.40.206
cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the cPanel software, often used by resellers and system administrators.
The /var/cpanel/sessions directory stored both user and root credentials in plain-text which could, under certain circumstances, allow a malicious administrator to view the details. Should a malicious administrator and/or someone compromise the server they would be able to monitor that directory and build a list of plain-text credentials which could be used elsewhere as users often use reuse the same password.
Proof of Concept:
Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.
We have deemed this vulnerability to be rated as LOW due to the fact that the file can only be viewed by an administrator. This is more of a “hardening” measure.
This vulnerability was tested against cPanel 220.127.116.11 and is believed to exist in all versions prior to the fixed builds below.
This vulnerability was patched in cPanel 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52 & 184.108.40.206.
Vendor Contact Timeline:
2013-07-23: Vendor contacted via email.
2013-08-01: Vendor confirms vulnerability.
2013-08-27: Vendor issues updates to all builds.
2013-08-29: Rack911 issues security advisory.