SolusVM WHMCS Addon Vulnerability -- Extremely Critical

technut

New member
I just got passed a link via a PM to this as I was going to bed.

http://localhost.re/p/solusvm-11303-vulnerabilities

Its quite serious, but SolusVM has already posted a fix. Read below:

================================================== ===


PLEASE READ THIS INFORMATION CAREFULLY. THIS INFORMATION IS RELEVANT TO ALL VERSIONS OF SOLUSVM, INCLUDING BETA VERSIONS.

A security update has now been released for the Stable and Beta versions of SolusVM. We advise you to make this update as soon as possible.

To run the update you can either do it from within the SolusVM admin area or from CLI on the master server. To preform the update from CLI the commands differ depending on the version of SolusVM you are running.

==================


Stable version:


/scripts/upcp

Beta version:

/scripts/upcp-beta

==================

Once the update is complete you will have the patched system.

We have included the original instructions in this email that were given when the exploit was announced and before we released the patched updates. If you feel the need to remove the originally exploited file after the update you can do the following:

==================

Instructions:

You will need root SSH access to your master server. You are then required to delete the following file:

/usr/local/solusvm/www/centralbackup.php

Example:


rm –f /usr/local/solusvm/www/centralbackup.php

==================

Due to this exploit we are conducting a full audit of the SolusVM client area code. The audit is already underway and any updates, if needed will be released in quick succession.

A full explanation of this exploit will be released in due course. We will also be reviewing the release status of version 1.14 due to the advanced security features it already contains.

Thank you for your continued support and apologies for any inconvenience caused.

Regards,
Soluslabs Security Team
 
Well, though they have already posted a fix, by they need to understand the problem as SolusVM is a popular control panel and lots of people are using it to manage their virtual servers. Instead of fixing such issues they need a dedicated team for continuous research and to test their products to defend their products against such vulnerabilities. One mistake will make them lose many customers.
 
Hi, we just received this email notice:

=======================================
Soluslabs Ltd Wednesday, June 19, 2013
03:06:42 AM GMT 0

PLEASE READ THIS INFORMATION CAREFULLY. THIS INFORMATION IS RELEVANT TO ALL VERSIONS OF SOLUSVM, INCLUDING BETA VERSIONS.
As you may be aware we are currently running a full in house and external code audit. This release contains several important security fixes for all versions of SolusVM.

We highly suggest you update your system as soon as possible. Updates are available through the normal channels.

Latest Beta Version: 1.14.00 R5
Latest Stable Version: 1.13.05

Please be aware the audit is still underway and more updates may follow.

Thank you for your co-operation and understanding.

Regards,
Soluslabs Security Team

2008-2013 © Soluslabs Ltd. All Rights Reserved
Please add us to your safe senders list to ensure you keep receiving these emails.
===================================================
 
There has been a lot of discussion about this topic, there are at least two providers who has been targeted by using this vulnerability and had some of their nodes wiped.

Some providers have also removed access to their SolusVM installation for their customers while this audit is ongoing, not to risk anything else.
 
Is the issue on Solus VM still exist.
its something serious and Solus Team shoud seriously handle this as many people use Solus for managing their virtual private servers
 
They are still conducting an external audit of their entire panel as far as I'm aware, so there may be some 0 days still out there.
 
Top