cPanel up to 64.0.20 API Cpanel::SPFUI privilege escalation – Digitalmunition




Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 4th, 2019 📆 | 1686 Views ⚑

0

cPanel up to 64.0.20 API Cpanel::SPFUI privilege escalation

CVSS Meta Temp ScoreCurrent Exploit Price (≈)
5.3$0-$5k

A vulnerability has been found in cPanel up to 64.0.20 (Hosting Control Software) and classified as critical. This vulnerability affects the function Cpanel::SPFUI of the component API. The manipulation with an unknown input leads to a privilege escalation vulnerability. The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was disclosed 08/02/2019. The advisory is available at documentation.cpanel.net. This vulnerability was named CVE-2017-18442 since 07/31/2019. Technical details are known, but there is no available exploit.

Upgrading to version 64.0.21 eliminates this vulnerability.

The entries 139332, 139333, 139334 and 139335 are pretty similar.

Type

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: cPanel 64.0.21

07/31/2019 CVE assigned
08/02/2019 +2 days Advisory disclosed
08/03/2019 +1 days VulDB entry created
08/03/2019 +0 days VulDB last updateAdvisory: documentation.cpanel.net

CVE: CVE-2017-18442 (🔒)
See also: 🔒

Created: 08/03/2019 07:51 AM
Complete: 🔍

Comments

No comments yet. Please log in to comment.

See the underground prices here!

https://vuldb.com/?id.139342

Tagged with:



Leave a Reply