-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The System Control Panel
www.SysCP.org
-= Security Advisory =-
Advisory: Ability to inject and execute any code as root in SysCP
Release Date: 2007/02/02
Last Modified: 2007/02/07
Author: Florian Lippert
Application: SysCP <= 1.2.15
Severity: Arbitrary code execution
Risk: Critical
Status: Patch and new release provided
Overview:
SysCP, the System Control Panel is a server administration tool
which enables an internet service provider to give their customers
a web-based application to administrate their email addresses,
their subdomains etc.
Two security issues, both making a remote code execution possible,
were discovered recently:
1) Within the panel, a customer can inject any malicious code which will
be executed by the cronjob, which runs as super user. This security
issue was discovered by Daniel Schulte and only
affects SysCP 1.2.15
2) With having access to the syscp-database one could insert any file to
be executed into panel_cronscript table. This security issue was
discovered by Martin Burchert and affects all
SysCP releases from 1.2.3 up to 1.2.15.
Details:
1) It's possible for a customer to create a directory-structure like
"; cp /var/www/syscp/lib/userdata.inc.php /var/kunden/webs/web1/; ls "
inside his homedir. If the customer tries to protect this directory with
the control panel, the cronscript will execute this command as root and
the customer has the MySQL-root-password inside his ftp-directory.
2) If an attacker has access to the database he could add any php file to
the table 'panel_cronscript', for example one that he uploaded into his
dir and which adds a new root-user or installs a backdor etc. Due to not
validating or restricting the files which are "include_onced" on
scripts/cronscript.php, line 139 (as of SysCP 1.2.15) this file will be
executed as the user which also executes the cronscript, normally root.
Recommendation:
For security issue #1 patch your installation with the provided patch
(http://files.syscp.org/misc/syscp-1.2.15s.patch) or upgrade to
SysCP 1.2.16, which fixes both security issues.
GPG-Key:
pub 1024D/5B97D56B 2007-02-07 Florian Lippert
Fingerprint: D974 4762 7993 A16E 4249 7BD5 61D3 9CEE 5B97 D56B
EOF
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (Darwin)
iD8DBQFFykJfYdOc7luX1WsRApFVAJ4oAb6sPFmzvUc3dtrtwmfymsW+6wCggQPy
dP3ag9i/r99Yvs7Dk4JNgDI=cqyF
-----END PGP SIGNATURE-----