Cpanel_Security_Advisory_Code_Execution_due_to_faulty_file_extionsion_dispatching

cPanel Security Advisory | Code execution due to faulty file extension dispatching.

Published on July 21st, 2020 cPanel has released a new cPanel security advisory for all public updates. These updates address security concerns with the cPanel & WHM product. This advisory is concerned with code execution due to faulty file extension dispatching in Cpanel and is currently available to all customers via the standard update system.

Aligning to industry best practices and standards of providing the best services to you, we publish security advisories that are designed to provide timely information to all our esteemed customers.

cPanel Security – TSR-2020-0004 Full Disclosure

cPanel and WHM’s cpsrvd daemon did not verify that some file extensions matched the actual file that would handle a request before dispatching the request to the file extension’s handler. 

In a default configuration of cPanel & WHM, this allowed webmail accounts to execute code on the server.

Also read,

How to identify and Prevent Common Security Threats to Your Website

Solution

This issue is resolved in the following builds:
11.88.0.13
11.86.0.24

We at Hostripples always encourage our customers to pursue the best practices of security to keep their systems updated, protected, and patched against recognized vulnerabilities.

Official references and security advisories:

https://news.cpanel.com/cpanel-tsr-2020-0004-full-disclosure/


If you have any queries regarding the patching/updates on Hostripples Networks infrastructure, you may write an email to support@hostripples.com


Cyril Chakranarayan

Cyril Chakranarayan - I love Travelling, Riding Bikes, and Reading. I am a passionate technology seeker and love to explore continuously evolving technology especially in the Cyber World, Working in the Web Hosting Industry for 10 years.