cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2 WHM Interface /scripts/park owner path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability marked as critical has been reported in cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2. Affected is an unknown function of the file /scripts/park of the component WHM Interface. The manipulation of the argument owner leads to path traversal. No exploit is available. It is suggested to upgrade the affected component.
Details
A vulnerability was found in cPanel 11.36.2.9/11.38.2.12/11.40.0.28/11.40.1.2 (Hosting Control Software). It has been rated as critical. This issue affects an unknown code of the file /scripts/park of the component WHM Interface. The manipulation of the argument owner with an unknown input leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Impacted is confidentiality.
The weakness was published 02/05/2014 as TSR 2014-0001 as confirmed advisory (Website). It is possible to read the advisory at cpanel.net. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1006 according to MITRE ATT&CK.
Upgrading to version 11.38.2.16, 11.40.1.10 or 11.42.0.4 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (91035) and Secunia (SA56719†). Similar entries are available at VDB-12272, VDB-12273, VDB-12274 and VDB-12276. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: cPanel 11.38.2.16/11.40.1.10/11.42.0.4
Timeline
02/05/2014 🔍02/05/2014 🔍
02/07/2014 🔍
02/13/2014 🔍
03/29/2019 🔍
Sources
Advisory: TSR 2014-0001Status: Confirmed
GCVE (VulDB): GCVE-100-12275
X-Force: 91035 - cPanel owner directory traversal, Medium Risk
Secunia: 56719 - cPanel Multiple Vulnerabilities, Moderately Critical
See also: 🔍
Entry
Created: 02/13/2014 09:24Updated: 03/29/2019 21:55
Changes: 02/13/2014 09:24 (52), 03/29/2019 21:55 (1)
Complete: 🔍
Cache ID: 216:584:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.