cPanel

New csf v7.57

Changes:

  • 7.57   – URLGET now set to “2” to use LWP by default on new installations instead of HTTP::Tiny
  • If URLGET set to use LWP, csf will perform upgrades over SSL to https://download.configserver.com
  • Added check for URLGET to Server Check
  • Added option “3” for CC_LOOKUPS to also include IP ASNs via the MaxMind GeoIPASNum database
  • Updated SSH login regexes
  • Updated named regex
  • Added 30 second timeout for ST_IPTABLES iptables stats writing to prevent a child creation loop
  • Modified lfd to restart if more than 200 children are currently active to prevent child creation loops

New cxs v5.08

Changes:

  • Fixed a rare potential issue with fingerprint processing in –xtra [file]
  • Added new advanced PHP decoders
  • Updated scripts to use https://download.configserver.com
  • Revert to using LWP::UserAgent instead of HTTP::Tiny for SSL support

New MSFE v4.55

Changes:

  • Updated scripts to use https://download.configserver.com
  • Updated WHM front-end to use the new ConfigServer yum repository for ms-clamav
  • Have msbe.pl check for split spool dirs and recreate if necessary

New cmq v1.23

Changes:

  • Updated scripts to use https://download.configserver.com

New cmm v1.32

Changes:

  • Updated scripts to use https://download.configserver.com

New cmc v1.16

Changes:

  • Updated scripts to use https://download.configserver.com

cxs and “CryptoPHP”

CryptoPHP:

http://blog.fox-it.com/2014/11/18/cryptophp-analysis-of-a-hidden-threat-inside-popular-content-management-systems/

cxs can detect “CryptoPHP” for currently reported variants (and has done so for some time with then known variants).

A few things to note:

  • As with all exploits, new variants are developed regularly so they will not always be detected
  • Ensure that you have a daily cron job to update cxs
  • cxs will not necessarily prevent an account being exploited as this “infection” is caused by clients installing illegal (“nulled”) applications that have already been exploited
  • As with all exploits, regular full cxs scans have to be run to detect newly reported variants that may have previously evaded cxs Watch
  • If you find new variants that are not detected by cxs, submit them to us in the normal manner (see the cxs –wttw [script] option in the documentation)

New cxs v5.07

Changes:

  • Modified new installs to better initially update to the latest fingerprints
  • Ignore and Xtra files can now use an Include statement to include additional files. If cxswatch is running then it will also watch the included files for changes and reload if necessary
  • Added new quarantine option –qignore [method] which used when restoring a file using –qrestore [file] will create an entry in –ignore [file] before restoring the file. See POD for more info
  • Optimised fingerprint database to remove duplicates and old entries of no value reducing the size without reducing effectiveness
  • Exploit fingerprint definitions database additions

New MailScanner Front-End v4.54

Changes:

  • Fix a problem with theme integration caused by cPanel breaking things in v11.46 and not bothering to release code to EDGE first for testing