ph

481 posts

ph banner
ph

ph

@wiredaddict

15x hw - laconic - tokenainamae lover

06 Katılım Mayıs 2020
590 Takip Edilen106 Takipçiler
ph
ph@wiredaddict·
@IntCyberDigest i have a feeling the coming months wont be much different :c
English
0
0
1
16
ph
ph@wiredaddict·
supplychain, rce, auth bypass, cred exfiltration, command injection, takeover, buffer overflow, ssti dur!
ph tweet media
International Cyber Digest@IntCyberDigest

🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.

English
2
1
10
1.5K
ph retweetledi
Old Internet
Old Internet@OldInternetFeel·
Old Internet tweet media
ZXX
0
248
2K
24.5K
ph
ph@wiredaddict·
ph tweet media
ZXX
0
0
0
22
analizan
analizan@gercekprompt·
on bes milyon kilo adet tane meyve alabilir miyim
Türkçe
4
1
18
455
ph
ph@wiredaddict·
emek her şeyi yener
Türkçe
0
1
5
85
ph
ph@wiredaddict·
gece tft oynamak
Türkçe
0
0
1
75
analizan
analizan@gercekprompt·
gunde 1 armut doktoru uzak tut
Türkçe
2
0
21
206
ph
ph@wiredaddict·
@b9r7s word of wisdom
English
0
0
1
33
baris
baris@b9r7s·
çoksa ver yoksa al
Türkçe
3
0
1
88
ph
ph@wiredaddict·
@gercekprompt bu abi ankamallda spawnlanan bir anomaly
Türkçe
1
0
22
3.4K
analizan
analizan@gercekprompt·
BU ADAMIN ISMI NE
analizan tweet media
Türkçe
39
10
1.2K
37.3K
Ludwig
Ludwig@Ludwig1301·
mii kesit
Ludwig tweet media
Indonesia
2
0
5
43
ph
ph@wiredaddict·
@IHATEKITSU sorun yok ben de göremiyorum
Türkçe
0
0
1
31
ph
ph@wiredaddict·
ph tweet media
ZXX
1
1
5
158
ph retweetledi
Math Files
Math Files@Math_files·
be greater than average
Math Files tweet media
English
37
1.3K
12.1K
225.3K