TrustKeeper Scan Engine Update - January 30, 2014

We've dug ourselves out from the snow and shaken off the icicles from our hands to bring you another TrustKeeper Scan Engine Update. This time around we've added support for over 40 vulnerabilities including a whole bunch for cPanel and Adobe ColdFusion. We've also added coverage for the recent Cisco backdoor vulnerability described here: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd. The update also includes the usual all-around improvements to the engine.

New Vulnerability Test Highlights

Some of the more interesting vulnerability tests we added recently are as follows:

Adobe ColdFusion

  • Adobe ColdFusion <= 10 Directory Traversal Local File Inclusion Vulnerability (CVE-2013-0629)

Cisco

cPanel

  • cPanel 'Rearrange an Account' File Disclosure Vulnerability

  • cPanel /var/cpanel/sessions Credential Disclosure Vulnerability

  • cPanel Account Transfer Information Disclosure Vulnerability

  • cPanel autorespond.pl Local Privilege Escalation Vulnerability

  • cPanel brandingimg.cgi Crafted Query Parameter Handling Access Restriction Bypasss

  • cPanel countedit.cgi Cross-site Scripting Vulnerability

  • cPanel cpAddons Access Restriction Bypass Vulnerability

  • cPanel cpAddons Installation Arbitrary Code Execution Vulnerability

  • cPanel cpAddons Stored Cross-Site-Scripting Vulnerability

  • cPanel cpanellogd Archive Creation Local Privilege Escalation

  • cPanel Crafted Query Parameter Harary File Manipulation

  • cPanel Denial of Service

  • cPanel Dovecot Authentication Bypass

  • cPanel EntropyChat Server Unspecified XSS

  • cPanel File Unlink

  • cPanel httpd.conf Denial of Service Vulnerability

  • cPanel Locale XML Arbitrary Code Execution Vulnerability

  • cPanel Multiple cpmysqladmin Commands Local SQL Injection

  • cPanel Multiple Unspecified Vulnerabilities

  • cPanel NVData Directory Traversal Vulnerability

  • cPanel Privilege Escalation

  • cPanel Reseller Account Creation Access Restriction Bypass

  • cPanel Unspecified API 2 Call Arbitrary File Access

  • cPanel Update Blocker Unspecified Symlink Arbitrary File Overwrite Local Privilege Escalation

  • cPanel WHM Account Un-suspension Vulnerability

  • cPanel WHM Apache Tweak Interface Command Injection

  • cPanel WHM Command Injection

  • cPanel WHM Cross-Site Request Forgery

  • cPanel WHM Cross-site Scripting

  • cPanel WHM Jailshell Privilege Escalation

  • cPanel WHM Local File Inclusion

  • cPanel WHM Privilege Escalation

  • cPanel WHM Session Expiration

  • cPanel WHM Webmail File Manipulation

How to Update?

All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.

Trustwave reserves the right to review all comments in the discussion below. Please note that for security and other reasons, we may not approve comments containing links.