CyberPanel DC-2024-51567: Critical Pre-Auth RCE Vulnerability

2024-11-18

This blog post details a critical pre-authentication Remote Code Execution (RCE) vulnerability impacting CyberPanel versions up to 2.3.6 and the unpatched 2.3.7.

Vulnerability Analysis

The flaw resides in the `upgrademysqlstatus` function within `databases/views.py`. It allows attackers to bypass authentication and execute arbitrary commands as root due to the following factors:

– Security Middleware Bypass: The `secMiddleware` meant to protect against unauthorized access only functions for POST requests. This vulnerability leverages a GET request.
– Shell Metacharacter Injection: The attacker can inject shell metacharacters into the `statusfile` property to achieve code execution.

Exploitation and Impact

This vulnerability was actively exploited in October 2024 by the PSAUX ransomware group, potentially compromising a significant number of servers.

| Field | Value |

| ——————– | ———————————————– |

| Platform | CyberPanel |

| Version | Up to 2.3.6, Unpatched 2.3.7 |
| Vulnerability | Pre-Auth Remote Code Execution (RCE) |
| Severity | CRITICAL (CVSS v3 score: 10.0) |
| Date | October 2024 (exploited), October 29, 2024 (fixed) |

What Undercode Says: (Analytics based on the blog article)

This critical vulnerability highlights the importance of timely security patching. Here are some key takeaways:

Widespread Impact: CyberPanel enjoys a large user base, making this vulnerability a significant concern.
Active Exploitation: The real-world exploitation by PSAUX ransomware underscores the urgency of patching.
Patch Availability: A patch addressing the vulnerability was released by CyberPanel on October 29, 2024.
Update Now: System administrators are strongly advised to update CyberPanel immediately to mitigate the risk.
Security Best Practices: Regularly update software and follow security best practices to minimize vulnerabilities.

References:

Reported By: Cve.org
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://openai.com
Undercode AI DI v2: https://ai.undercode.helpFeatured Image

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top