getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cyberpanel
Cyberpanel cyberpanel |
|
Weaknesses | CWE-276 | |
CPEs | cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cyberpanel
Cyberpanel cyberpanel |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | getresetstatus in dns/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. | getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. |
Tue, 29 Oct 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | getresetstatus in dns/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-29T00:00:00
Updated: 2024-10-30T14:21:00.555Z
Reserved: 2024-10-28T00:00:00
Link: CVE-2024-51378
Vulnrichment
Updated: 2024-10-30T14:20:39.348Z
NVD
Status : Awaiting Analysis
Published: 2024-10-29T23:15:04.083
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-51378
Redhat
No data.