TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2024-51567

CRITICALCISA KEV
10.0

Beschreibung

upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

CVE Details

CVSS v3.1 Bewertung10.0
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/29/2024
Zuletzt geandert11/7/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerCyberPersons
ProduktCyberPanel
SchwachstellennameCyberPanel Incorrect Default Permissions Vulnerability
KEV Aufnahmedatum2024-11-07
Behebungsfrist2024-11-28
Ransomware-NutzungKnown

Betroffene Produkte

cyberpanel:cyberpanel

Schwachen (CWE)

CWE-306CWE-306

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.