Vulnerability identifier: #VU4873
Vulnerability risk: Low
CVSSv4.0: 3.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
cPanel
Web applications /
Remote management & hosting panels
Vendor: cPanel, Inc
Description
The vulnerability allows a remote attacker to read arbitrary files on the system.
The vulnerability exists due to an error when processing valiases for users. A remote authenticated user can create valias, which includes other files, and read them with privileges of Exim system user.
Successful exploitation of the vulnerability may allow an attacker to read arbitrary files on the system.
Mitigation
This issue is resolved in the following builds:
62.0.4
60.0.35
58.0.43
Vulnerable software versions
cPanel: 11.58.0.3 - 11.62.0.2
External links
https://news.cpanel.com/tsr-2017-0001-full-disclosure/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.