Type: File Deletion
Location: Local
Impact: Medium
Product: CloudFlare (cPanel Plugin)
Website: http://www.cloudflare.com
Vulnerable Version: 4.5
Fixed Version: 4.7
CVE: -
R911: 0115
Date: 2014-01-21
By: Rack911
Product Description:

CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through our intelligent global network. We automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. We also block threats and limit abusive bots and crawlers from wasting your bandwidth and server resources. The result: CloudFlare-powered websites see a significant improvement in performance and a decrease in spam and other attacks.

Vulnerability Description:

It is possible for a malicious user to delete the Cloudflare_Data.yaml file belonging to any user on a server running CloudFlare's cPanel plugin due to an input validation failure.


We have deemed this vulnerability to be rated as MEDIUM due to the fact that a malicious user can interfere with other users CloudFlare installations. (No sensitive data can be obtained or anything of that nature.)

Vulnerable Version:

This vulnerability was tested against CloudFlare (cPanel Plugin) v4.5 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched CloudFlare (cPanel Plugin) v4.7.

Vendor Contact Timeline:

2014-01-16: Vendor contacted via email.
2014-01-16: Vendor confirms vulnerability.
2014-01-19: Vendor issues updates to all builds.
2014-01-21: Rack911 issues security advisory.