upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 |
Thu, 07 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Fri, 01 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cyberpanel
Cyberpanel cyberpanel |
|
CPEs | cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cyber Panel
Cyber Panel cyber Panel |
Cyberpanel
Cyberpanel cyberpanel |
Wed, 30 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cyber Panel
Cyber Panel cyber Panel |
|
Weaknesses | CWE-276 | |
CPEs | cpe:2.3:a:cyber_panel:cyber_panel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cyber Panel
Cyber Panel cyber Panel |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-29T00:00:00
Updated: 2024-11-07T17:20:22.871Z
Reserved: 2024-10-29T00:00:00
Link: CVE-2024-51567
Vulnrichment
Updated: 2024-10-30T13:52:42.708Z
NVD
Status : Analyzed
Published: 2024-10-29T23:15:04.307
Modified: 2024-11-08T21:14:28.807
Link: CVE-2024-51567
Redhat
No data.