SB2025052212 - cPanel EasyApache4 update for third-party components
Published: May 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper error handling (CVE-ID: CVE-2025-23166)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect error handling in async cryptographic operations within the SignTraits::DeriveBits() function. A remote attacker can send specially crafted input to the application can crash the Node.js runtime.
2) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2025-23167)
The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
The vulnerability exists due to improper validation of HTTP/1 headers in llhttp. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.
Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.
3) Memory leak (CVE-ID: CVE-2025-23165)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in ReadFileUtf8 caused by a corrupted pointer. A remote attacker can force the application to leak memory and perform denial of service attack.
4) Incorrect default permissions (CVE-ID: CVE-2023-49582)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to lax permissions set by the Apache Portable Runtime library on Unix platforms. A local user can read the named shared memory segments.
Remediation
Install update from vendor's website.