Vulnerability Note VU#831534

cPanel fails to verify input passed to the "user" parameter

Original Release date: 16 Mar 2004 | Last revised: 17 Mar 2004


A remotely exploitable vulnerability in CPanel's password reset and login scripts may allow a remote attacker to gain control of the vulnerable system.


Cpanel is an application that provides the ability to manage accounts and provides an interface to the end users of web hosting sevices. CPanel versions 8.6.0 build 31 though 9.1.0 build 40 contain a remotely exploitable vulnerability. This is due to the failure to verify input specified in the "user" parameter of the URL in the "resetpass" and "login" sections.


A remote attacker may be able to gain root access to the CPanel server.


This is resolved in CPanel Version 9.1.0 build 41.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
CPanel Inc.Affected-16 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Arab VieruZ.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: Unknown
  • Date Public: 11 Mar 2004
  • Date First Published: 16 Mar 2004
  • Date Last Updated: 17 Mar 2004
  • Severity Metric: 21.16
  • Document Revision: 21


If you have feedback, comments, or additional information about this vulnerability, please send us email.