Korean
<< Back
VID 23063
Severity 40
Port 2082
Protocol TCP
Class CGI
Detailed Description The cPanel program allows remote execution of commands.
cPanel is a Web-based management interface for Linux-based operating systems. cPanel versions 9.1.0 build 34 and earlier could allow a remote attacker to execute arbitrary commands on the affected system, caused by improper handling of supplied data to the login script. A remote attacker could exploit this vulnerability by crafting a malicious URI request including shell metacharacters for the affected script. If successfully exploited, the attacker could execute arbitrary commands on the system with root privileges. You can test this vulnerability by issuing the following URI:

http://[targethost.com]:2082/login/?user=|"`id`"|

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-03/0107.html
http://archives.neohapsis.com/archives/bugtraq/2004-03/0116.html
http://www.securityfocus.com/archive/1/357268

* Platforms Affected:
cPanel 9.1.0 build34 and prior
Linux Any version
Recommendation If it is not required, disable the service.

-- OR --

No patch or upgrade available as of March 2004.
If an official patch for this vulnerability is released, apply the appropriate patch, available from cPanel Web site, cPanel Downloads at http://www.cpanel.net/downloads.htm
Related URL CVE-2004-1769 (CVE)
Related URL 9848,9853,9855 (SecurityFocus)
Related URL 15443 (ISS)