CVE-2020-29472

9.8 CRITICAL

📋 TL;DR

CVE-2020-29472 is a SQL injection vulnerability in EGavilan Media's Under Construction page with cPanel 1.0 plugin. Attackers can exploit this to gain admin panel access and execute arbitrary code remotely. Organizations using this specific plugin version are affected.

💻 Affected Systems

Products:
  • EGavilan Media Under Construction page with cPanel
Versions: 1.0
Operating Systems: Any OS running cPanel with this plugin
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the specific plugin to be installed and active in cPanel.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized admin access leading to website defacement, data exfiltration, or malware injection.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring detecting exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making this easily exploitable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1 or later

Vendor Advisory: https://www.egavilanmedia.com/security-advisory-cve-2020-29472

Restart Required: No

Instructions:

1. Log into cPanel. 2. Navigate to plugin management. 3. Update 'Under Construction page with cPanel' to version 1.0.1 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

linux

Temporarily disable the Under Construction page plugin until patched

cpanel-plugin-manager --disable under-construction-cpanel

Web Application Firewall rule

all

Block SQL injection patterns targeting the vulnerable endpoint

Add WAF rule: deny requests containing SQL injection patterns to /cpanel/under-construction endpoint

🧯 If You Can't Patch

  • Remove the plugin completely from all affected systems
  • Implement strict network segmentation to isolate affected systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check cPanel plugin list for 'Under Construction page with cPanel' version 1.0

Check Version:

cpanel-plugin-manager --list | grep 'under-construction-cpanel'

Verify Fix Applied:

Verify plugin version shows 1.0.1 or later in cPanel plugin manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in web server logs
  • Multiple failed login attempts followed by successful admin access
  • Requests to /cpanel/under-construction with SQL syntax

Network Indicators:

  • Outbound connections from cPanel server to unknown IPs
  • Unusual database query patterns

SIEM Query:

source="web_logs" AND uri="/cpanel/under-construction" AND (query CONTAINS "UNION" OR query CONTAINS "SELECT *" OR query CONTAINS "--")

🔗 References

📤 Share & Export