← Zuruck zu CVEs
CVE-2024-51378
CRITICALCISA KEV10.0
Beschreibung
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVE Details
CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/29/2024
Zuletzt geandert11/7/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerCyberPersons
ProduktCyberPanel
SchwachstellennameCyberPanel Incorrect Default Permissions Vulnerability
KEV Aufnahmedatum2024-12-04
Behebungsfrist2024-12-25
Ransomware-NutzungKnown
Betroffene Produkte
cyberpanel:cyberpanel
Schwachen (CWE)
CWE-78CWE-78
Referenzen
https://cwe.mitre.org/data/definitions/420.html(cve@mitre.org)
https://cwe.mitre.org/data/definitions/78.html(cve@mitre.org)
https://cyberpanel.net/KnowledgeBase/home/change-logs/(cve@mitre.org)
https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel(cve@mitre.org)
https://github.com/usmannasir/cyberpanel/commit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-51378(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.