CPanel's Black Week: 3 New Vulnerabilities Patched After Attack on 44k Servers
110 points
9 hours ago
| 8 comments
| copahost.com
| HN
zuzululu
8 hours ago
[-]
Ages ago I used php-nuke to manage my forum and it got hacked and I thought it would get taken seriously

Seeing these CPanel hacks remind me how old these codebases are and how much more vulnerability remain

reply
dainiusse
8 hours ago
[-]
I don't agree that "old" necessarily implies vulnerability.
reply
tclancy
4 hours ago
[-]
As a coder who just hit 50, trust me, it does.
reply
pixl97
7 hours ago
[-]
I mostly disagree on your disagreement unless the entire project was based on top security practices and good code in the first place. The vast majority of these web panels are a security nightmare.
reply
omnimus
7 hours ago
[-]
These PHP systems be it cPanel, wordpress or PHP itself are most likely the biggest target besides windows. It's incredibly uncool stack especially here but it is running most of the "independent" small web.

They cannot be that bad if they are managing to be ductape of the internet.

reply
Meekro
6 hours ago
[-]
I've done PHP development for over 20 years, including some pretty large projects. I've never had a situation where a security flaw in PHP itself forced me to scramble to patch something before it got hacked.

On the other hand, for my Linux servers, I had to do that twice in the last month with CopyFail and DirtyFrag.

reply
diek
3 hours ago
[-]
CVE-2021-21703 [0] is a similar class of bug in the PHP interpreter itself that was pretty recent

https://www.sentinelone.com/vulnerability-database/cve-2021-...

reply
ipaddr
2 hours ago
[-]
This is not a PHP language interpreter bug this is a PHP FPM bug.
reply
diek
53 minutes ago
[-]
That's a fair point, using 'interpreter' specifically was imprecise language on my part. My main point was php-fpm is developed by the core PHP team and is often the default in how PHP projects deploy these days, and that CVE was very similar to the recent 'fail' LPE vulnerabilities in the kernel.
reply
dylan604
5 hours ago
[-]
Every time I venture in the the web server's error log, I see all of the skiddie's attempts at accessing the most common things with most of them being .php files. Lots of /wp/admin.php and /phpadmin/ type requests. Of course, none of those are available which is why the requests are in the error log. I've never paid attention, but I wonder how long (as in how little time) for a new server to come online before it starts to get probed by a skiddie. Whether they are just war dialing IPs or paying attention to new domain announcements but I'd put it on a few hours tops.
reply
hamburglar
5 hours ago
[-]
Dismissing these as script kiddie attempts is no longer correct. This is a real industry now. It’s not like the large scale actors are going to pass up a valid unpatched vector just because it’s old hat.
reply
dylan604
4 hours ago
[-]
yes, but how often otherwise would i get to use the word skiddie?
reply
rstupek
3 hours ago
[-]
If you get a letsencrypt certificate it will get probed within a minute
reply
jmb99
2 minutes ago
[-]
I’ve tested this recently (this post week). Had a dns entry up and pointing to an nginx server for ~12 hours, zero requests. 17 seconds after the letsencrypt cert was issued, the floodgates opened. Over a dozen of requests per second.
reply
doublerabbit
2 hours ago
[-]
22 minutes. I got my new ISP with fibre. Placed my web server online. 22 minutes my honey pot got stung.
reply
hvb2
7 hours ago
[-]
> They cannot be that bad if they are managing to be ductape of the internet.

I think there are just a whole lot of tools written for them. So non devs can spin things up and click some things together.

Is that safe and secure? Maybe, if the devs did their work well. But I'm positive no one reads the docs on how to configure something securely.

I think the real reason is that it's very cheap to host, and always has been

reply
ChocolateGod
7 hours ago
[-]
cPanel is Perl.
reply
robocat
5 hours ago
[-]
Yes. Perl for core backend logic, automation, legacy systems, APIs. Some other languages used for bits and pieces.

https://api.docs.cpanel.net/guides/guide-to-perl

reply
anamexis
7 hours ago
[-]
How does that follow?
reply
cinntaile
7 hours ago
[-]
They have a big target on their back so the low hanging fruit is (mostly) gone.
reply
bsder
2 hours ago
[-]
> They cannot be that bad if they are managing to be ductape of the internet.

Oh, it very much can be that bad. Most "security" relies on the Hungry Tiger Theory of Security(tm).

My system doesn't need to be "secure". My system simply needs to be more secure than yours. As long as there is an easier and/or more valuable target somewhere, I'm "secure". I don't need to outrun the hungry tiger; I only need to outrun you outrunning the hungry tiger.

That theory, of course, doesn't hold anymore when there are enough tigers to simply eat everybody. And that's what AI did; it multiplied the tigers enough that they can just gorge on everything.

Now, people are going to have to put in "actual security" or lose real money over and over and over. And since everybody has outsourced everything, nobody knows how to fix it quickly. The lawyers are going to have a field day.

At the end, however, we'll have real security on our internet facing systems. But man, it's going to be painful for a while.

reply
TZubiri
7 hours ago
[-]
The concept of a GUI wrapper on top of the Linux ecosystem is what's broken.

Not because of a fundamental limitation of that architecture, but because in practice the type of people that will use it do not want to learn or develop the necessary skills to administer it, and critical information like man pages and parameter lists are hidden.

You can't take shortcuts without consequences.

reply
walrus01
6 hours ago
[-]
Remember 'webmin'?

As someone who pretty much exclusively uses debian, freebsd and openbsd for server OS work, I was also rather surprised recently to see the default web gui that comes on a new fedora install.

https://cockpit-project.org/

reply
mappu
1 hour ago
[-]
I was pleasantly surprised to learn the architecture for this - a minimal backend that does a PAM auth and gives you a shell over websocket, with only your own Linux user credentials - and then everything else (from managing files to apache to VMs) is done in frontend javascript.

Keeps the server-side backend minimal and auditable.

reply
esseph
3 hours ago
[-]
Also comes default on Red Hat Enterprise Linux, Rocky Linux , AlmaLinux, Oracle Linux, and SUSE.

Also walrus from old, old UBNT forum? If so, hello :)

reply
majicDave
5 hours ago
[-]
> The concept of a GUI wrapper on top of the Linux ecosystem is what's broken

That is a nugget, it's so true.

Wrappers in general are such an issue in software. Wrappers built on top of wrappers, this desire to abstract everything away makes things look simpler, but every layer slows things down and hides what is actually happening. Every wrapper is another layer of complexity, another hoop to jump through when you're looking for a solution to a problem.

reply
ricardonunez
7 hours ago
[-]
Of course is the architecture and the creator of such a thing, isn’t the point of a tool like that for users that don’t have the tech knowledge? I have only used those systems on shared hosting, host providers are the one maintaining and should be keeping them up to date and WHM/Cpnel have plenty of customers to worry too patch holes, if they can’t then who’s fault is it, Architecture, or provider? Hope is the customers fault?
reply
walrus01
6 hours ago
[-]
I would worry less about big shared hosting providers, who have a strong interest in patching their stuff quickly, than the market of people who get one or two dedicated servers or KVM VMs and then install cpanel on them and for the rest of the time they use it, ignore the CLI of the servers and never patch anything. There's a lot of small users of cpanel that have just a few licenses.
reply
doublerabbit
2 hours ago
[-]
Php-nuke was the hacking testing ground. Nuke was atrocious for exploitation.
reply
jszymborski
1 hour ago
[-]
I was thinking about php-nuke I while back and it's terrible security rep. I figured it was just the regular PHP foot guns of the era, but I took a look at the code recently and boy howdy that was some truly atrocious code. I'm not security person (although perhaps security minded) and I found a million problems after a cursory glance.
reply
anonzzzies
8 hours ago
[-]
CPanel and hosters who use them are in big trouble now; there are millions of servers running them, many of them for decades. Their clients can run code as an user without much sandboxing/guardrails at all.
reply
rurban
5 hours ago
[-]
But those are updated automatically. It's unlike Windows or Linux, where the user decides when to update. cPanel updates are decided by cPanel
reply
breakingcups
7 hours ago
[-]
Such a different era.
reply
omnimus
7 hours ago
[-]
If you look at the usage numbers, you could argue we are still in that era.
reply
addedGone
7 hours ago
[-]
I miss this era, we overcomplicated everything
reply
0xbadcafebee
1 hour ago
[-]
44,000 servers compromised? Sounds like somebody could've used a software building code
reply
eagerpace
6 hours ago
[-]
Wow, similar sentiments about this being a throw back. I’d rather roll my own almost everything these days, may not be as good, but certainly won’t be targeted exploited broadly.
reply
hackthemack
6 hours ago
[-]
Many years ago. Maybe 2005 to 2015? I had a friend who used cpanel to run a web hosting company. He made quite a bit of money doing that. He was not a programmer, but he could setup up wordpress and install plugins. I remember asking him once if he was worried he would get hacked and then lose control of his servers? Lose his customers?

He said he was worried but he had backups upon backups. I saw him restore a bunch of websites once, using cpanel, and I thought it is an amazing little bit of software with all of the click a button to setup many different things (like WAF). A real time saver and provides some guidance if you are not a unix-internet guru.

reply
josu
4 hours ago
[-]
So CPanel's security is just as bad as their UI, who would have thought?
reply
operatingthetan
8 hours ago
[-]
People are still using cpanel?
reply
kiritanpo
8 hours ago
[-]
Most shared hosting plans use cpanel. It's still widely used yes for a lot of smaller websites.
reply
dawnerd
7 hours ago
[-]
And even if it doesn’t look like it chances are it still is with a fancier ui on top.
reply
ilia-a
7 hours ago
[-]
I wonder how much shared hosting is there really left, I imagine much of it move to VPS or cheap cloud boxes.
reply
duskwuff
43 minutes ago
[-]
I'm especially curious how much small-scale shared hosting is left. The big companies like EIG are certainly still around, but the little one-off hosting companies are much less common.
reply
omnimus
7 hours ago
[-]
I highly doubt that. It's giant market and with these custom small sites made by third parties you actually want to have client owned hosting and third parties who deploy to that hosting. Clients have learned to separate these otherwise the third party can have huge leverage (your business and all data is ours).
reply
walrus01
6 hours ago
[-]
There's still a very big market of people for whom being given a VPS with ssh access and a command line is beyond their technical capability or comfort level.

Ever seen the upsell offers in the check-out workflow for hosting packages that come when you buy a new .com domain from any major registrar? All those are shared hosting packages where everything is done through some sort of web gui.

reply
smallerize
1 hour ago
[-]
But you have to keep a VPS updated yourself, right? A hosted site doesn't require any action from the customer to stay up to date.
reply
xp84
8 hours ago
[-]
There are a lot of things that have been up for decades. The ROI on moving a simple PHP or static website to new hosting situation hasn’t been that compelling… though that could change. Thing is, I suspect most users of shared hosting which is Cpanel’s bread and butter are not reading the latest cybersecurity news.
reply
TZubiri
7 hours ago
[-]
The ROI has just increased by like 10x or 100x this week.
reply
ramesh31
8 hours ago
[-]
CPanel on shared hosting running WordPress PHP is literally half of the entire internet still.
reply
whatsupdog
8 hours ago
[-]
Half of the entire internet is Meta properties.
reply
fmbb
8 hours ago
[-]
That’s the other half.

Coincidentally also PHP.

reply
Shish2k
7 hours ago
[-]
Facebook started out PHP; but they ship-of-theseus'ed it into Hack by replacing the standard library, the language, and the runtime engine, so now it's a totally different thing with only a few superficial similarities (FWIW IMO Hack is much better than PHP, I'm sad that it never gained traction...)
reply
ceejayoz
6 hours ago
[-]
Much of what was good in Hack just got rolled into PHP.
reply
walrus01
6 hours ago
[-]
And if it's not cpanel, it's Plesk
reply
throwawaytea
4 hours ago
[-]
I run an entire saas that 36 companies pay for, built in PHP, and I drag and drop the files to the server via cpanel.
reply
zb3
5 hours ago
[-]
"AI safeguards" are not working I guess.. or maybe they're only working against those who'd like to secure their software.. good job Anthropic + OpenAI!
reply
rickdg
5 hours ago
[-]
Friendly reminder that there aren't that many ways for a normie to create their own (sub)domain with TLS and an email in under five minutes. That's cPanel for ya.
reply
walrus01
5 hours ago
[-]
The alternatives to cpanel would mostly be all-in-one hosting providers like 'squarespace' or similar, which have rolled their own web GUI to automate a basic normie workflow of domain registration, putting basic DNS records in a zone, hosting the DNS, getting TLS certs, putting basic content on a httpd. It's interesting to see the "set up your small business website now!" advertising to totally non technical people.
reply
sgammon
4 hours ago
[-]
Yes, there are many ways to do that now, in under 5 minutes. Cloudflare will set all of that up just fine. GSuite is much easier to set up than CPanel.
reply