We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-51378



Description

getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

Reserved 2024-10-28 | Published 2024-10-29 | Updated 2024-12-06 | Assigner mitre


CRITICAL: 10.0CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N

CISA Known Exploited Vulnerability

Date added 2024-12-04 | Due date 2024-12-25

Known Ransomware Campaign(s)

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

References

cwe.mitre.org/data/definitions/78.html

github.com/...ommit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683

refr4g.github.io/...erpanel-command-injection-vulnerability/

cyberpanel.net/KnowledgeBase/home/change-logs/

cwe.mitre.org/data/definitions/420.html

cyberpanel.net/...ent-security-issue-and-patch-of-cyberpanel

www.bleepingcomputer.com/...ets-22-000-cyberpanel-instances/

cve.org (CVE-2024-51378)

nvd.nist.gov (CVE-2024-51378)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-51378

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.