{"id":1091,"date":"2020-11-28T09:11:28","date_gmt":"2020-11-28T09:11:28","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=1091"},"modified":"2020-11-28T09:11:28","modified_gmt":"2020-11-28T09:11:28","slug":"2-factor-authentication-bypass-flaw-reported-cpanel-whm-software","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/2-factor-authentication-bypass-flaw-reported-cpanel-whm-software\/","title":{"rendered":"2-Factor Authentication Bypass Flaw Reported in cPanel and WHM Software"},"content":{"rendered":"<p>Bypass cPanel, a provider of popular administrative tools to manage web hosting,<\/p>\n<p>has patched a security vulnerability that could have allowed remote attackers with access to valid credentials to bypass two-factor authentication (2FA) protection on an account.<\/p>\n<h3>The issue, tracked as &#8220;SEC-575&#8221; and discovered by researchers from\u00a0Digital Defense, has been remedied by the company in versions 11.92.0.2, 11.90.0.17, and 11.86.0.32 of the software.\u00a0 Bypass<\/h3>\n<p>cPanel and WHM (Web Host Manager) offers a Linux-based control panel for users to handle website and server management, including tasks such as adding sub-domains and performing system and control panel maintenance. To date, over\u00a070 million domains\u00a0have been launched on servers using cPanel&#8217;s software suite.<\/p>\n<p>The issue stemmed from a lack of rate-limiting during 2FA during logins, thus making it possible for a malicious party to repeatedly submit 2FA codes using a brute-force approach and circumvent the authentication check.<\/p>\n<p>Digital Defense researchers said an attack of this kind could be accomplished in minutes.<\/p>\n<p>&#8220;The two-factor authentication cPanel Security Policy did not prevent an attacker from repeatedly submitting two-factor authentication codes,&#8221; cPanel said in its\u00a0advisory. &#8220;This allowed an attacker to bypass the two-factor authentication check using brute-force techniques.&#8221;<\/p>\n<p>The company has now addressed the flaw by adding a rate limit check to its\u00a0cPHulk\u00a0brute-force protection service, causing a failed validation of the 2FA code to be treated as a failed login.<\/p>\n<p>This is not the first time the absence of rate-limiting has posed a serious security concern.<\/p>\n<p>Back in July, video conferencing app Zoom\u00a0fixed a security loophole\u00a0that could have allowed potential attackers to crack the numeric passcode used to secure private meetings on the platform and snoop on participants.<\/p>\n<p>It&#8217;s recommended that cPanel customers apply the patches to mitigate the risk associated with the flaw.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bypass cPanel, a provider of popular administrative tools to manage web hosting, has patched a security vulnerability that could have<\/p>\n","protected":false},"author":1,"featured_media":1092,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[412,391,1303,1301,310,394,260,199],"class_list":["post-1091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1091"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1092"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1091"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}