| VID |
23063 |
| Severity |
40 |
| Port |
2082 |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The cPanel program allows remote execution of commands. cPanel is a Web-based management interface for Linux-based operating systems. cPanel versions 9.1.0 build 34 and earlier could allow a remote attacker to execute arbitrary commands on the affected system, caused by improper handling of supplied data to the login script. A remote attacker could exploit this vulnerability by crafting a malicious URI request including shell metacharacters for the affected script. If successfully exploited, the attacker could execute arbitrary commands on the system with root privileges. You can test this vulnerability by issuing the following URI:
http://[targethost.com]:2082/login/?user=|"`id`"|
* References: http://archives.neohapsis.com/archives/bugtraq/2004-03/0107.html http://archives.neohapsis.com/archives/bugtraq/2004-03/0116.html http://www.securityfocus.com/archive/1/357268
* Platforms Affected: cPanel 9.1.0 build34 and prior Linux Any version |
| Recommendation |
If it is not required, disable the service.
-- OR --
No patch or upgrade available as of March 2004. If an official patch for this vulnerability is released, apply the appropriate patch, available from cPanel Web site, cPanel Downloads at http://www.cpanel.net/downloads.htm |
| Related URL |
CVE-2004-1769 (CVE) |
| Related URL |
9848,9853,9855 (SecurityFocus) |
| Related URL |
15443 (ISS) |
|