---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: cPanel "failurl" HTTP Response Splitting Vulnerability SECUNIA ADVISORY ID: SA38255 VERIFY ADVISORY: http://secunia.com/advisories/38255/ DESCRIPTION: Trancer has reported a vulnerability in cPanel, which can be exploited by malicious people to conduct HTTP response splitting attacks. Input passed to the "failurl" parameter in login/index.php is not properly sanitised before being returned to the user. This can be exploited to insert arbitrary HTTP headers, which are included in a response sent to the user. The vulnerability is reported in version 11.25.0 build 42174. Other versions may also be affected. SOLUTION: Reportedly fixed in version 11.25.0 build 42213 and later. PROVIDED AND/OR DISCOVERED BY: Trancer ORIGINAL ADVISORY: http://www.rec-sec.com/2010/01/21/cpanel-http-response-splitting-vulnerability/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------