Type: Input Validation Failure
Vulnerable Version: All versions prior to the fixed builds below.
Fixed Version: 126.96.36.199, 188.8.131.52 & 184.108.40.206
cPanel is an easy-to-use control panel that gives web hosts and the website owners they serve, the ability to quickly and easily manage their servers and websites. Web Host Manager (WHM) is a part of the
cPanel software, often used by resellers and system administrators.
It is possible for a reseller to evade the actual process of modifying accounts by using a nullbyte (%00) to send commands directly to hooks. There does not appear to be any sanitation of special characters and as such, cPanel has put many plugins that have hooks tied into modifyacct at risk of being compromised.
We have deemed this vulnerability to be rated as HIGH due to the fact that cPanel plugins using various hooks dependent on modifyacct can be compromised.
This vulnerability was tested against cPanel 11.40.0 #19 and is believed to exist in all versions prior to the fixed builds below.
This vulnerability was patched in cPanel 220.127.116.11, 18.104.22.168 & 22.214.171.124.
Vendor Contact Timeline:
2013-12-25: Vendor contacted via email.
2014-01-08: Vendor confirms vulnerability.
2014-02-03: Vendor issues updates to all builds.
2014-02-05: Rack911 issues security advisory.