Vulnerabilities Found in Version of RvSkin

There were recently several serious vulnerabilities addressed in RvSkin. Via Rack911:

RVSkin – Hardlink Local Privilege Escalation (R911-0063)

Type: Privilege Escalation
Location: Local
Impact: High
Product: RVSkin
Website: http://www.rvskin.com
Vulnerable Version: 10.83
Fixed Version: 10.84
CVE: –
R911: 0063
Date: 2013-09-03
By: Rack911

Product Description:

RVSkin is an advance skin to use in web server control panel. A skin software provides multi-language, multi-theme, and many intelligent features to bring your unique interface differentiates your business.

Vulnerability Description:

A reseller can create a malicious hardlink pointing to any file on the server and take control of that file once they log into RVSkin via the WHM interface. The end result is that the attacker would be able to gain root access.

Proof of Concept:

Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

Vulnerable Version:

This vulnerability was tested against RVSkin v10.83 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in RVSkin v10.84.

Vendor Contact Timeline:

2013-08-18: Vendor contacted via email.
2013-08-25: Vendor confirms vulnerability.
2013-09-02: Vendor issues update.
2013-09-03: Rack911 issues security advisory.

Via Rack911:

RVSkin – Hardlink Local Privilege Escalation (R911-0064)

Type: Privilege Escalation
Location: Local
Impact: High
Product: RVSkin
Website: http://www.rvskin.com
Vulnerable Version: 10.83
Fixed Version: 10.84
CVE: –
R911: 0064
Date: 2013-09-03
By: Rack911

Product Description:

RVSkin is an advance skin to use in web server control panel. A skin software provides multi-language, multi-theme, and many intelligent features to bring your unique interface differentiates your business.

Vulnerability Description:

A reseller can create a malicious hardlink pointing to any file on the server and take control of that file once the nightly RVSkin update runs. The end result is that the attacker would be able to gain root access.

Proof of Concept:

Due to the nature of this security flaw, we will not be posting a Proof of Concept until a much later date.

Impact:

We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

Vulnerable Version:

This vulnerability was tested against RVSkin v10.83 and is believed to exist in all prior versions.

Fixed Version:

This vulnerability was patched in RVSkin v10.84.

Vendor Contact Timeline:

2013-08-18: Vendor contacted via email.
2013-08-25: Vendor confirms vulnerability.
2013-09-02: Vendor issues update.
2013-09-03: Rack911 issues security advisory.

Leave a Reply

Your email address will not be published. Required fields are marked *