cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2 XML API get_remote_access_hash Hash information disclosure
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability labeled as problematic has been found in cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2. This impacts the function get_remote_access_hash of the component XML API. Executing a manipulation can lead to information disclosure (Hash).
There is no exploit available.
The affected component should be upgraded.
Details
A vulnerability was found in cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2 (Hosting Control Software). It has been declared as problematic. This vulnerability affects the function get_remote_access_hash of the component XML API. The manipulation with an unknown input leads to a information disclosure vulnerability (Hash). The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality.
The weakness was shared 02/05/2014 as TSR 2014-0001 as confirmed advisory (Website). The advisory is available at cpanel.net. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are known, but there is no available exploit. This vulnerability is assigned to T1592 by the MITRE ATT&CK project. The advisory points out:
Reseller accounts, regardless of their ACLs, were able to retrieve and alter root’s accesshash credentials via the get_remote_access_hash XML-API command by supplying empty user and password arguments.
Upgrading to version 11.38.2.16, 11.40.1.10 or 11.42.0.4 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (91034) and Secunia (SA56719†). The entries VDB-12272, VDB-12273, VDB-12275 and VDB-12276 are related to this item. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Name: HashClass: Information disclosure / Hash
CWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: cPanel 11.38.2.16/11.40.1.10/11.42.0.4
Timeline
02/05/2014 🔍02/05/2014 🔍
02/13/2014 🔍
11/19/2018 🔍
Sources
Advisory: TSR 2014-0001Status: Confirmed
GCVE (VulDB): GCVE-100-12274
X-Force: 91034 - cPanel get_remote_access_hash information disclosure, Medium Risk
Secunia: 56719 - cPanel Multiple Vulnerabilities, Moderately Critical
See also: 🔍
Entry
Created: 02/13/2014 09:24Updated: 11/19/2018 09:24
Changes: 02/13/2014 09:24 (44), 11/19/2018 09:24 (8)
Complete: 🔍
Cache ID: 216:F55:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.