Vulnerability Note VU#584089

cPanel XSRF vulnerabilities

Original Release date: 30 Apr 2008 | Last revised: 30 Jul 2008

Overview

cPanel contains multiple cross-site request forgery (XSRF) vulnerabilities. If successfully exploited, these vulnerabilities may allow an attacker to execute arbitrary commands.

Description

cPanel, a web-based tool that is designed to automate and control web sites and servers, contains multiple cross-site request forgery (XSRF) vulnerabilities. These vulnerabilities may be triggered by a remote attacker who convinces an administrator to browse to a malicious website while logged into their cPanel account.

Impact

An attacker may be able to perform actions that only authorized administrators should be able to execute.

Solution

We are currently unaware of a practical solution to this problem.

Enable referrer checking

Referrer checking may mitigate some XSRF attacks. To enable referrer checking, follow the steps below. Note that referrer checking may cause some applications to fail.

  1. Navigate to Server configuration
  2. Go to Tweak Settings
  3. Go to Security in WebHost Manager 
  4. Check the box and save the page

Do not browse to untrusted sites

Administrators can mitigate XSRF vulnerabilities in cPanel and other browser-based tools by not browsing to untrusted websites while logged into their account.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
cPanel Inc.Affected22 Apr 200828 Apr 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Michael Brooks for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2008-2043
  • Date Public: 17 Apr 2008
  • Date First Published: 30 Apr 2008
  • Date Last Updated: 30 Jul 2008
  • Severity Metric: 2.25
  • Document Revision: 21

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.