2013-09-11

There were recently several serious vulnerabilities addressed in RvSkin. Via Rack911:

RVSkin – Hardlink Local Privilege Escalation (R911-0063)

Type: Privilege Escalation

Location: Local

Impact: High

Product: RVSkin

Website: http://www.rvskin.com

Vulnerable Version: 10.83

Fixed Version: 10.84

CVE: -

R911: 0063

Date: 2013-09-03

By: Rack911

Product Description:

RVSkin is an advance skin to use in web server control panel. A skin software provides multi-language, multi-theme, and many intelligent features to bring your unique interface differentiates your business.

Vulnerability Description:

A reseller can create a malicious hardlink pointing to any file on the server and take control of that file once they log into RVSkin via the WHM interface. The end result is that the attacker would be able to gain root access.

Proof of Concept:

Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

Vulnerable Version:

This vulnerability was tested against RVSkin v10.83 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in RVSkin v10.84.

Vendor Contact Timeline:

2013-08-18: Vendor contacted via email.

2013-08-25: Vendor confirms vulnerability.

2013-09-02: Vendor issues update.

2013-09-03: Rack911 issues security advisory.

Via Rack911:

RVSkin – Hardlink Local Privilege Escalation (R911-0064)

Type: Privilege Escalation

Location: Local

Impact: High

Product: RVSkin

Website: http://www.rvskin.com

Vulnerable Version: 10.83

Fixed Version: 10.84

CVE: -

R911: 0064

Date: 2013-09-03

By: Rack911

Product Description:

RVSkin is an advance skin to use in web server control panel. A skin software provides multi-language, multi-theme, and many intelligent features to bring your unique interface differentiates your business.

Vulnerability Description:

A reseller can create a malicious hardlink pointing to any file on the server and take control of that file once the nightly RVSkin update runs. The end result is that the attacker would be able to gain root access.

Proof of Concept:

Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

Vulnerable Version:

This vulnerability was tested against RVSkin v10.83 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in RVSkin v10.84.

Vendor Contact Timeline:

2013-08-18: Vendor contacted via email.

2013-08-25: Vendor confirms vulnerability.

2013-09-02: Vendor issues update.

2013-09-03: Rack911 issues security advisory.

The post Vulnerabilities Found in Version of RvSkin appeared first on HostDime Blog.

Show more