Shortly after cPanel released TSR-2021-0001 updates for all public update tiers, the company also released the full disclosure. The TSR-2021-0001 updates provide targeted changes to address security concerns with the cPanel & WHM product. cPanel has rated these updates as having CVSSv3.1 scores ranging from 2.5 to 3.3. Customers can download the new build via the standard update system.
SEC-578
Summary
Reseller suspension lock bypass.
Security Rating
cPanel has assigned this vulnerability a CVSSv3.1 score of 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Description
It is possible to suspend an already suspended account via the WHM API. This can allow for an attacker to re-suspend and then unsuspend an account suspension-locked by the root user.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
- 11.92.0.9
- 11.86.0.36
SEC-579
Summary
MySQL user suspension fails with old-style password hashes.
Security Rating
cPanel has assigned this vulnerability a CVSSv3.1 score of 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Description
When suspending a MySQL user with old-style password hashes on a MySQL 5.5 system, suspendacct would fail to disable the passwords. This allowed access to the databases to remain active.
Credits
This issue was discovered by the cPanel Security Team.
Solution
This issue is resolved in the following builds:
- 11.92.0.9
- 11.86.0.36