{"vuid":"VU#831534","idnumber":"831534","name":"cPanel fails to verify input passed to the \"user\" parameter","keywords":["cPanel","user","resetpass"],"overview":"A remotely exploitable vulnerability in CPanel's password reset and login scripts may allow a remote attacker to gain control of the vulnerable system.","clean_desc":"Cpanel is an application that provides the ability to manage accounts and provides an interface to the end users of web hosting sevices. CPanel versions 8.6.0 build 31 though 9.1.0 build 40 contain a remotely exploitable vulnerability. This is due to the failure to verify input specified in the \"user\" parameter of the URL in the \"resetpass\" and \"login\" sections.","impact":"A remote attacker may be able to gain root access to the CPanel server.","resolution":"This is resolved in CPanel Version 9.1.0 build 41.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Arab VieruZ.","author":"This document was written by Jason A Rafail.","public":["http://secunia.com/advisories/11111/","http://secunia.com/advisories/11124/","http://forums.cpanel.net/showthread.php?s=&threadid=21684&perpage=15&page%20number=2"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-12T18:44:16Z","publicdate":"2004-03-11T00:00:00Z","datefirstpublished":"2004-03-16T22:13:17Z","dateupdated":"2004-03-17T16:25:15Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"1","cam_internetinfrastructure":"12","cam_population":"8","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"21.16125","cam_scorecurrentwidelyknown":"21.16125","cam_scorecurrentwidelyknownexploited":"33.345","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":21.16125,"vulnote":null}