Skip to content

Commit 61ef3df

Browse files
committed
1 parent 5328aed commit 61ef3df

3 files changed

Lines changed: 50 additions & 0 deletions

File tree

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
id: CVE-2026-41940
2+
info:
3+
name: CVE-2026-41940
4+
author: crowdsec
5+
severity: info
6+
description: CVE-2026-41940 testing - cPanel WHM auth bypass via stripped ob cookie
7+
tags: appsec-testing
8+
http:
9+
- raw:
10+
- |
11+
GET / HTTP/1.1
12+
Host: {{Hostname}}
13+
Cookie: whostmgrsession=%3aQSJN_sFdKZtCi2o_
14+
Authorization: Basic cm9vdDp4DQpoYXNyb290PTENCnRmYV92ZXJpZmllZD0xDQp1c2VyPXJvb3Q=
15+
16+
cookie-reuse: true
17+
matchers:
18+
- type: status
19+
status:
20+
- 403
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/base-config.yaml
3+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2026-41940.yaml
4+
nuclei_template: CVE-2026-41940.yaml
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
name: crowdsecurity/vpatch-CVE-2026-41940
2+
description: 'Detects cPanel & WHM authentication bypass (CVE-2026-41940) by identifying a whostmgrsession cookie with a stripped ob segment (no comma separator)'
3+
rules:
4+
- and:
5+
- zones:
6+
- COOKIES
7+
variables:
8+
- whostmgrsession
9+
transform:
10+
- lowercase
11+
- urldecode
12+
match:
13+
type: regex
14+
value: '^:[a-z0-9_]+$'
15+
16+
labels:
17+
type: exploit
18+
service: http
19+
confidence: 3
20+
spoofable: 0
21+
behavior: 'http:exploit'
22+
label: 'cPanel WHM - Authentication Bypass'
23+
classification:
24+
- cve.CVE-2026-41940
25+
- attack.T1190
26+
- cwe.CWE-306

0 commit comments

Comments
 (0)