← Volver a CVEs
CVE-2024-51567
CRITICALCISA KEV10.0
Descripcion
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Detalles CVE
Puntuacion CVSS v3.110.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/29/2024
Ultima modificacion11/7/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorCyberPersons
ProductoCyberPanel
Nombre vulnerabilidadCyberPanel Incorrect Default Permissions Vulnerability
Fecha inclusion KEV2024-11-07
Fecha limite remediacion2024-11-28
Uso en ransomwareKnown
Productos afectados
cyberpanel:cyberpanel
Debilidades (CWE)
CWE-306CWE-306
Referencias
https://cwe.mitre.org/data/definitions/420.html(cve@mitre.org)
https://cwe.mitre.org/data/definitions/78.html(cve@mitre.org)
https://cyberpanel.net/KnowledgeBase/home/change-logs/(cve@mitre.org)
https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel(cve@mitre.org)
https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce(cve@mitre.org)
https://github.com/usmannasir/cyberpanel/commit/5b08cd6d53f4dbc2107ad9f555122ce8b0996515(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-51567(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.