Knowledgebase

Portal Home > Knowledgebase > Articles Database > cPanel Vulnerability Found - Upgrade Recommended [MERGED]


cPanel Vulnerability Found - Upgrade Recommended [MERGED]




Posted by ataylor, 05-02-2008, 12:18 AM
Just came through on the RSS feeds... http://blog.cpanel.net/?p=39

Posted by tanfwc, 05-02-2008, 12:50 AM
Another round of updates needed to be done again

Posted by Virtuoso Host, 05-02-2008, 04:08 AM
Several potential security issues have been identified with cPanel software and Horde, a 3rd party bundled application. cPanel releases prior to 11.18.4 and 11.22.2 are susceptible to security issues, which range in severity from trivial to medium-critical. Along with the discovery of these potential issues, cPanel has released a new security tool to provide users with protection from XSRF attacks. Update Advisory ============================== All STABLE and RELEASE users are strongly urged to update to their respective 11.18.5 release. CURRENT and EDGE users should update to the latest 11.22.3 release. No releases are deemed susceptible to severe, critical or root access vulnerabilities. XSRF Protection ============================== cPanel has also introduced a tool designed to protect against a category of attacks known as cross-site request forgery (XSRF). This tool will validate the browser referrer information against an approved list of domains. The list of approved domains is automatically determined according to the system's configuration. Any blocked requests are presented to the end user for approval. This additional step will minimize disruption of workflow while protecting the user from an outside XSRF attack. This check will not prevent bookmarked links in modern browsers from working normally. XSRF protection is not enabled by default. It is controlled via WHM's Tweak Settings under the Security heading. The protection may also be enabled manually by adding the following line to the end of /var/cpanel/cpanel.config: referrersafety=1 and restarting cpsrvd by executing /usr/local/cpanel/startup. Regards, Rob

Posted by netomatic, 05-02-2008, 04:32 AM
No releases are deemed susceptible to severe, critical or root access vulnerabilities.

Posted by PowerDot, 05-02-2008, 04:33 AM
but may break integration with other systems, login applications, and billing software.

Posted by 1boss1, 05-02-2008, 04:59 AM
Its amazing how many cPanel exploits keep cropping up, you would think after so many years it would be rock solid by now.

Posted by PCS-Chris, 05-02-2008, 08:36 AM
When was this information released? There was a horde exploit over a month ago now and a fix was released on the day, is this reffering to the same one?

Posted by tuxg, 05-02-2008, 08:41 AM
No, it is a new one, released on May 1st. http://blog.cpanel.net/?p=39

Posted by Patrick, 05-02-2008, 09:18 AM
There are more (scarier) exploits that the public never finds out about, but silently gets fixed for the greater of good. As for your second comment, I would have to disagree. With ever changing software, new features being added and what not, there is always going to be an increased chance of security flaws introduced into the software.



Was this answer helpful?

Add to Favourites Add to Favourites    Print this Article Print this Article

Also Read
WHMCS or HostBillAPP? (Views: 553)
Voxtreme (Views: 575)


Language:

Contact us