We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Reserved 2024-10-28 | Published 2024-10-29 | Updated 2024-12-06 | Assigner mitreDate added 2024-12-04 | Due date 2024-12-25
Known Ransomware Campaign(s)
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
cwe.mitre.org/data/definitions/78.html
github.com/...ommit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683
refr4g.github.io/...erpanel-command-injection-vulnerability/
cyberpanel.net/KnowledgeBase/home/change-logs/
cwe.mitre.org/data/definitions/420.html
cyberpanel.net/...ent-security-issue-and-patch-of-cyberpanel
www.bleepingcomputer.com/...ets-22-000-cyberpanel-instances/
Support options