Featured Item

EasyApache 3.26.3 Released

SUMMARY
cPanel, Inc. has released EasyApache 3.26.3 with PHP version 5.5.15, Libxslt version 1.1.28 and Libxml2 version 2.9.1. This release addresses PHP vulnerability CVE-2014-4670 by fixing a bug in the SPL component, CVE-2012-6139 by fixing a bug in Libxslt, and fixes bugs in Libxml2 to address the following CVEs: CVE-2012-5134, CVE-2013-0338, CVE-2013-0339, CVE-2013-1969, and CVE-2013-2877. We encourage all PHP 5.5 users to upgrade to PHP version 5.5.15, and all users to upgrade to Libxslt version 1.1.28 and Libxml2 version 2.9.1.

AFFECTED VERSIONS
All versions of PHP 5.5 before 5.5.15.
All versions of Libxslt before 1.1.28.
All versions of Libxml2 before 2.9.1.

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2014-4670 – MEDIUM

PHP 5.5.15
Fixed a bug in the SPL component related to CVE-2014-4670.

CVE-2012-6139 – MEDIUM

Libxslt 1.1.28
Fixed a bug in the Libxslt library related to CVE-2012-6139.

CVE-2012-5134 – MEDIUM

Libxml2 2.9.1
Fixed an out of bound access bug in the Libxml2 library related to CVE-2012-5134.

CVE-2013-0338 – MEDIUM

Libxml2 2.9.1
Fixed a bug in the Libxml2 library related to CVE-2013-0338.

CVE-2013-0339 – MEDIUM

Libxml2 2.9.1
Fixed a bug in the Libxml2 library related to CVE-2013-0339.

CVE-2013-1969 – HIGH

Libxml2 2.9.1
Fixed buffer conversion bugs related to CVE-2013-1969.

CVE-2013-2877 – MEDIUM

Libxml2 2.9.1
Fixed a bug in the Libxml2 library related to CVE-2013-2877.

SOLUTION
cPanel, Inc. has released EasyApache 3.26.3 with updated versions of PHP 5.5, Libxslt and Libxml2 to correct these issues. Unless you have disabled EasyApache updates, EasyApache updates automatically. Run EasyApache to rebuild your profile with the latest versions of PHP, Libxslt and Libxml2.

REFERENCES
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4670
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6139
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5134
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0338
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0339
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1969
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2877
http://php.net/ChangeLog-5.php#5.5.15
http://xmlsoft.org/ChangeLog.html
http://xmlsoft.org/Libxslt/ChangeLog.html

For the PGP-signed message, see ea 3-26-3 CVE-signed.

Posted in: News, Software Updates | Tagged: , , , ,
Featured Item

cPanel TSR-2014-0005 Full Disclosure

Case 93317

Summary

Limited SQL injection vulnerability in LeechProtect.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem was vulnerable to a limited SQL injection in its handling of IP subnets due to incorrect escaping.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 93321

Summary

Limited arbitrary file modification via LeechProtect subsystem.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP addresses. This subsystem performed insufficient validation of the data passed to it by Apache, which allowed a local attacker to modify the password files controlling email, FTP, WebDAV, or HTTP accounts for other users on the local system.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 97233

Summary

Process locking based on ‘ps’ vulnerable to attack by local users.

Security Rating

cPanel has assigned a Security Level of Minor to this vulnerability.

Description

Several subsystems in cPanel & WHM used the output from ‘ps’ to prevent multiple instances of an operation from occurring simultaneously. Due to flaws in the way ‘ps’ output was parsed, an authenticated local attacker could create processes that blocked these subsystems from operating.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 98253

Summary

Insecure permissions on eximstats SQL password file.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The eximstats functionality of cPanel & WHM allows an administrator to generate reports of mail activity on the server. When switching to a remote MySQL server, the file containing the password for the eximstats database was set to world-readable permissions. This allowed a local attacker to gain access to the eximstats database.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 99749

Summary

Bypass of account ownership restrictions during account creation.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The WHM /scripts5/wwwacct and “createacct” API commands allowed resellers with limited privileges to supply unsafe “force”, “forcedns”, and “is_restore” options during account creation. These options would allow a reseller without the “all” ACL to take control over other existing accounts on the system and bypass other account creation restrictions.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 99861

Summary

Update analysis logs sent without proper SSL certificate validation.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

cPanel & WHM includes opt-in functionality to submit copies of various system log files to cPanel for quality assurance purposes. This system posts a tarball containing the files to a cPanel controlled server using HTTPS. Validation of the SSL certificate used during this connection was disabled, potentially allowing an attacker to masquerade as the cPanel log processing server and connect the information being submitted.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 100677

Summary

Arbitrary file unlink via fixwebalizer script.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The fixwebalizer script removed files from the target user’s home directory while running with the effective permissions of the root user. A malicious local user could leverage this behavior to delete arbitrary files on the system.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 100957

Summary

Arbitrary YAML file read via import_old_support_cfg script.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The import_old_support_cfg script runs automatically during the nightly upcp process to migrate reseller support contact information settings from an old configuration format into a new one. This script performed an unsafe YAML file read inside the reseller’s home directory while running with root’s permissions. A local attacker could use this flaw to copy data from an arbitrary YAML file into their home directory.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 101677

Summary

Bypass of account suspension via mail filters.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

cPanel & WHM’s functionality for suspending an account allows mail delivery to continue normally while disabling website access. Using the mail filter functionality of cPanel & WHM, a suspended account could remove the .htaccess files used to disable website access. Apache virtual host includes are used now, rather than .htaccess files to prevent web access from being restored in this fashion.

Credits

This issue was discovered by Matt Sheldon.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 103341

Summary

Arbitrary code execution via Mailman pickle files.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

Mailman uses Python pickle files to store configuration values. With some configurations of Apache, the pickle files used by mailman were given incorrect file ownership settings. A local attacker could utilize this fact to overwrite one of Mailman’s pickle files and execute arbitrary code when the pickle file was deserialized (BugTrack ID 5257). Under some circumstances, this would allow a local attacker to execute arbitrary code as root.

Credits

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23

Case 105337

Summary

Arbitrary file read via Exim virtual aliases.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

A crafted string in an Exim user valias configuration file could allow a user to read any file on the system. This was caused by incorrect configuration of the user and group settings in Exim’s router configurations.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Case 105353

Summary

Bypass of commondomains and hostname restrictions in WHM Add DNS interface.

Security Rating

cPanel has assigned a Security Level of Moderate to this vulnerability.

Description

The WHM Add DNS interface allows a reseller to assign ownership of a DNS zone to a specific cPanel account. This interface did not enforce DNS zone restrictions against the use of the server’s hostname or domains listed in the commondomains file. Resellers with the “create-dns” ACL could leverage this behavior to bypass these restrictions.

Credits

This issue was discovered by Rack911.

Solution

This issue is resolved in the following builds:
11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

Multiple Cases (10)

Summary

Multiple XSS vulnerabilities in various interfaces.

Description

Output filtering errors in several different interfaces allowed JavaScript inputs to be returned to the browser without proper filtering. The affected interfaces are listed below.

Case: 99353
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /scripts2/sshkeys
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 99637
Security Rating: Moderate
XSS Type: Stored
Interface: WHM
URLs: /scripts4/listaccts
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 100669
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /cgi/addrbl.cgi
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 100685
Security Rating: Important
XSS Type: Stored
Interface: WHM
URLs: /scripts/reallyemailall
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 101013
Security Rating: Minor
XSS Type: Self-stored
Interface: WHM
URLs: /cgi/diskusage.cgi
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 102853
Security Rating: Minor
XSS Type: Self
Interface: WHM
URLs: /cgi/easyapache.pl
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 102877
Security Rating: Minor
XSS Type: Self
Interface: WHM
URLs: /scripts9/upload_legacy_file
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

Case: 104033
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewcrt.html, /frontend/x3/ssl/viewcrt.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: Cody Brocious

Case: 105229
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewkey.html, /frontend/x3/ssl/viewkey.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: Cody Brocious

Case: 105273
Security Rating: Minor
XSS Type: Self-stored
Interface: cPanel
URLs: /frontend/paper_lantern/ssl/viewcsr.html, /frontend/x3/ssl/viewcsr.html
Affected Releases: 11.44.1, 11.44.0, 11.42.1, 11.40.1
Reporter: cPanel Security Team

cPanel includes a comprehensive protection mechanism against XSS and XSRF attacks called Security Tokens. Security Tokens protection is enabled by default in all installs of cPanel & WHM. When Security Tokens protection is enabled, an attacker intending to utilize any self-XSS vulnerabilities must convince the victim to navigate their browser to the appropriate cPanel or WHM interface and manually input the JavaScript payload.

Credits

These issues were discovered by the respective reporters listed above.

Solution

These issues are resolved in the following builds:

11.44.1.5
11.44.0.29
11.42.1.23
11.40.1.18

For the PGP-signed message, see: http://cpanel.net/wp-content/uploads/2014/07/TSR-2014-0005-Full-Disclosure.txt

Posted in: News, Security | Tagged: , ,

EasyApache 3.26.2 Released

SUMMARY
cPanel, Inc. has released EasyApache 3.26.2 with Apache version 2.4.10. This release addresses Apache vulnerabilities CVE-2014-0117, CVE-2014-0226, CVE-2014-0118, and CVE-2014-0231 by fixing bugs in the mod_proxy, mod_deflate, and mod_cgid modules. We encourage all Apache 2.4 users to upgrade to Apache version 2.4.10.

AFFECTED VERSIONS
All versions of Apache 2.4 before 2.4.10.

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2014-0117 – MEDIUM

Apache 2.4.10
Fixed bug in the mod_proxy module related to CVE-2014-0117.

CVE-2014-0226 – MEDIUM

Apache 2.4.10
Fixed a race condition related to CVE-2014-0226.

CVE-2014-0118 – MEDIUM

Apache 2.4.10
Fixed bug in the mod_deflate module related to CVE-2014-0118.

CVE-2014-0231 – MEDIUM

Apache 2.4.10
Fixed bug in the mod_cgid module related to CVE-2014-0231.
SOLUTION
cPanel, Inc. has released EasyApache 3.26.2 with an updated version of Apache 2.4 to correct these issues. Unless you have disabled EasyApache updates, EasyApache updates automatically. Run EasyApache to rebuild your profile with the latest version of Apache.

REFERENCES
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0117
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0226
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0118
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0231
https://www.apache.org/dist/httpd/CHANGES_2.4

For the PGP-signed message, see ea 3-26-2 CVE-signed.

Posted in News, Software Updates | Tagged: , , , ,

cPanel TSR-2014-0005 Announcement

cPanel TSR-2014-0005 Announcement

cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system.

cPanel has rated these updates as having security impact levels ranging from Minor to Important.

Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels.

If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations aat your earliest convenience.

RELEASES

The following cPanel & WHM versions address all known vulnerabilities:

* 11.44.1.5 & Greater
* 11.44.0.29 & Greater
* 11.42.1.23 & Greater
* 11.40.1.18 & Greater

The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net.

SECURITY ISSUE INFORMATION

The cPanel security team and independent security researchers identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time.

Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 22 vulnerabilities in cPanel & WHM software versions 11.44, 11.42, and 11.40.

Additional information is scheduled for release on July 28th, 2014.

For information on cPanel & WHM Versions and the Release Process, read our documentation at:
http://go.cpanel.net/versionformat.

If you would like to sign up for Security notices, please go to http://cpanel.net/mailing-lists.

For the PGP-signed message, see http://cpanel.net/wp-content/uploads/2014/07/TSR-2014-0005-Accouncement.txt.

Posted in News, Security | Tagged: , ,

EasyApache 3.26 Released

We are happy to announce the release of EasyApache 3.26 for cPanel & WHM. EasyApache 3.26 features a redesigned profile page that is easier to use and more informative.

EasyApache’s redesigned profile page includes cPanel & WHM’s new Optimal Profiles. The new Optimal Profiles include the recommended versions of PHP and Apache, and the modules that ensure that your EasyApache build is more secure and reliable. The new Optimal Profiles are tailored to your operating system and include profiles that we designed for the CloudLinux operating system. “Our Optimal Profiles help ensure a higher level of safety for our customers,” said the cPanel EasyApache Team.

For the most secure environment, we recommend that you use EasyApache’s new MPM ITK Optimal Profile for CloudLinux. This profile utilizes EasyApache 3.26’s new Apache MPM ITK option. The Apache MPM ITK option is available for CentOS, but does not include the additional security that the CloudLinux operating system provides. For more information on CloudLinux, visit CloudLinux.com.

Posted in News, Press Releases, Software Updates | Tagged: , , , ,

EasyApache 3.24.22 Released

SUMMARY
cPanel, Inc. has released EasyApache 3.24.22 with PHP 5.4.30 and 5.5.14. This release addresses multiple PHP vulnerabilities in the PHP core code and the Fileinfo, Network, and SPL modules. We encourage all PHP users to upgrade to PHP 5.4.30 and PHP 5.5.14.

Continue reading

Posted in News, Software Updates | Tagged: , , , ,

Important Partner Notice

You may have noticed an addition to the Update Company Information page, located under the Company tab in Manage2. It now includes a Purchase CloudLinux Url or email address field. This field allows you to determine the visibility and functionality of EasyApache’s Upgrade to CloudLinux button.

Continue reading

Posted in News, Software Updates | Tagged: , , , ,

11.44 Now in RELEASE Tier

6/17/2014
Houston, TX -

cPanel, Inc. is thrilled to release cPanel & WHM software version 11.44, which is now available in the RELEASE tier.

Continue reading

Posted in News, Press Releases, Release Announcements | Tagged: , ,

11.44 Now in CURRENT Tier

6/3/2014
Houston, TX -

cPanel, Inc. is thrilled to release cPanel & WHM software version 11.44, which is now available in the CURRENT tier.

Continue reading

Posted in News, Press Releases, Release Announcements | Tagged: , , ,

EasyApache 3.24.19 Released

SUMMARY
cPanel, Inc. has released EasyApache 3.24.19 with PHP versions 5.5.13 and 5.4.29. This release addresses the PHP vulnerabilities CVE-2014-0237 and CVE-2014-0238 with fixes to bugs in the fileinfo extension. We encourage all PHP users to upgrade to PHP version 5.5.13 or PHP version 5.4.29.

Continue reading

Posted in News, Software Updates | Tagged: , , , ,
Page 1 of 3012345...102030...Last »