Vulnerability Note VU#831534
cPanel fails to verify input passed to the "user" parameter
A remotely exploitable vulnerability in CPanel's password reset and login scripts may allow a remote attacker to gain control of the vulnerable system.
Cpanel is an application that provides the ability to manage accounts and provides an interface to the end users of web hosting sevices. CPanel versions 8.6.0 build 31 though 9.1.0 build 40 contain a remotely exploitable vulnerability. This is due to the failure to verify input specified in the "user" parameter of the URL in the "resetpass" and "login" sections.
A remote attacker may be able to gain root access to the CPanel server.
This is resolved in CPanel Version 9.1.0 build 41.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|CPanel Inc.||Affected||-||16 Mar 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by Arab VieruZ.
This document was written by Jason A Rafail.
- CVE IDs: Unknown
- Date Public: 11 Mar 2004
- Date First Published: 16 Mar 2004
- Date Last Updated: 17 Mar 2004
- Severity Metric: 21.16
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.