CVE-2004-1603

5.5 MEDIUM
Published: October 18, 2004 Modified: April 16, 2026
View on NVD

Description

cPanel 9.4.1-RELEASE-64 follows hard links, which allows local users to (1) read arbitrary files via the backup feature or (2) chown arbitrary files via the .htaccess file when Front Page extensions are enabled or disabled.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=109811572123753&w=2
Source: cve@mitre.org
Mailing List
http://marc.info/?l=bugtraq&m=109811654104208&w=2
Source: cve@mitre.org
Mailing List
http://secunia.com/advisories/12865
Source: cve@mitre.org
Broken Link Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/11449
Source: cve@mitre.org
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/11455
Source: cve@mitre.org
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17779
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/17780
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=109811572123753&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://marc.info/?l=bugtraq&m=109811654104208&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://secunia.com/advisories/12865
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/11449
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.securityfocus.com/bid/11455
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17779
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/17780
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
0.1%
31th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cpanel