We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-51378



Assignermitre
Reserved2024-10-28
Published2024-10-29
Updated2024-10-30

Description

getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.



CRITICAL: 10.0CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N

References

https://cwe.mitre.org/data/definitions/78.html

https://github.com/usmannasir/cyberpanel/commit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683

https://refr4g.github.io/posts/cyberpanel-command-injection-vulnerability/

https://cyberpanel.net/KnowledgeBase/home/change-logs/

https://cwe.mitre.org/data/definitions/420.html

https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel

https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/

cve.org CVE-2024-51378

nvd.nist.gov CVE-2024-51378

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.