← Zuruck zu CVEs
CVE-2024-51567
CRITICALCISA KEV10.0
Beschreibung
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVE Details
CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/29/2024
Zuletzt geandert11/7/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerCyberPersons
ProduktCyberPanel
SchwachstellennameCyberPanel Incorrect Default Permissions Vulnerability
KEV Aufnahmedatum2024-11-07
Behebungsfrist2024-11-28
Ransomware-NutzungKnown
Betroffene Produkte
cyberpanel:cyberpanel
Schwachen (CWE)
CWE-306CWE-306
Referenzen
https://cwe.mitre.org/data/definitions/420.html(cve@mitre.org)
https://cwe.mitre.org/data/definitions/78.html(cve@mitre.org)
https://cyberpanel.net/KnowledgeBase/home/change-logs/(cve@mitre.org)
https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel(cve@mitre.org)
https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce(cve@mitre.org)
https://github.com/usmannasir/cyberpanel/commit/5b08cd6d53f4dbc2107ad9f555122ce8b0996515(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-51567(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.