Type: Content Disclosure (MySQL Access)
Vulnerable Version: v4.11.6 and v5.0.5
Fixed Version: v4.11.6 #475 and v5.0.5 #516
The InterWorx control panel is a Linux based dedicated server and VPS web control panel. It is feature rich for both the system administrator and website administrator. Supports software-based load balancing and clustering via a web interface.
There is a flaw within the import / restore feature that allows an attacker to use a malicious archive to gain access to sensitive files via a symlink attack on the bandwidth reporting graphs. The attacker would be able to access any file owned by the iworx user including the iworx.ini file that contains in plain-text the MySQL passwords for several important accounts that would ultimately allow access to all client hosted databases.
Note: In order for this vulnerability to work, the attacker must social engineer the hosting company to restore the malicious archive. However, because transferring and restoring accounts is such a common practice in the hosting world we believe this exploit to be trivial to perform.
Proof of Concept:
Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.
We have deemed this vulnerability to be rated as HIGH due to the fact that MySQL access can be obtained as the ‘iworx’ user which is where all of the customer databases are stored. It would be the equivalent of compromising the root MySQL credentials with other control panels.
This vulnerability was tested against InterWorx v4.11.6 + v5.0.5 BETA and is believed to exist in all prior versions.
This vulnerability was patched in InterWorx v4.11.6 #475 + v5.0.5 #516.
Vendor Contact Timeline:
2013-05-19: Vendor contacted via email.
2013-05-20: Vendor confirms vulnerability.
2013-05-20: Vendor issues v4.11.6 #475 update.
2013-05-20: Vendor issues v5.0.5 #516 update.
2013-05-28: Rack911 issues security advisory.