Type: Symlink attack Location: Local Impact: High Product: cloudflare (cPanel Plugin) website: http://www.cloudflare.com Vulnerable Version: 5.3.2 Fixed Version: 5.3.11 CVE: - R911: 0187 Date: 2016-01-15
CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through our intelligent global network. We automatically optimize the delivery of your web pages so your visitors get the fastest page load times and best performance. We also block threats and limit abusive bots and crawlers from wasting your bandwidth and Server resources. The result: CloudFlare-powered websites see a significant improvement in performance and a decrease in spam and other attacks.
Due to a carefully timed symlink attack directed at the cloudflare_data.yaml file, it is possible for a malicious user to change the permissions on any root owned file to 600 which could lead to the OS being disabled.
We have deemed this vulnerability to be rated as HIGH due to the fact that should the malicious user target certain system files, such as /etc/passwd, it could render the OS inoperable.
This vulnerability was tested against CloudFlare (cPanel Plugin) v5.3.2 and is believed to exist in all prior versions.
This vulnerability was patched CloudFlare (cPanel Plugin) v5.3.11.
Vendor Contact Timeline:
2016-01-13: Vendor contacted via HackerOne.
2016-01-13: Vendor confirms vulnerability.
2016-01-14: Vendor issues update.
2016-01-15: RACK911 Labs issues security advisory.
How to Check the Latest Version of Cloudflare cPanel Plugin on Server
cat /usr/local/cpanel/etc/cloudflare.json | grep version
To Update the Cloudflare version
Soure : RACK911 Labs