CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through our intelligent global network. We automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. We also block threats and limit abusive bots and crawlers from wasting your bandwidth and server resources. The result: CloudFlare-powered websites see a significant improvement in performance and a decrease in spam and other attacks.
There is a local privilege escalation flaw in CloudFlare's cPanel Plugin that would allow an attacker to write to any file on the server leading to a root compromise.
Proof of Concept:
Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.
We have deemed this vulnerability to be rated as CRITICAL due to the fact that root access can be obtained.
This vulnerability was tested against CloudFlare (cPanel Plugin) v4.2 and is believed to exist in all prior versions.
This vulnerability was patched CloudFlare (cPanel Plugin) v4.5.
Vendor Contact Timeline:
2013-10-18: Vendor contacted via email.
2013-10-18: Vendor confirms vulnerability.
2013-10-21: Vendor issues updates to all builds.
2013-10-22: Rack911 issues security advisory.
Re-install instructions, if auto update doesn't work:
curl -k -L https://github.com/cloudflare/CloudFlare-CPanel/tarball/master > cloudflare.tar.gz
tar -xvf cloudflare.tar.gz
./install_cf Key mod_cf "Company"
When you initially signed up for CloudFlare they gave you a key. You need to replace that with your key, otherwise the software will not work properly. After you have re-installed the software, check the .json file again to ensure it says 4.5 or later.