← Back to CVEs
CVE-2024-51378
CRITICALCISA KEV10.0
Description
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CVE Details
CVSS v3.1 Score10.0
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/29/2024
Last Modified11/7/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorCyberPersons
ProductCyberPanel
Vulnerability NameCyberPanel Incorrect Default Permissions Vulnerability
KEV Date Added2024-12-04
Remediation Due Date2024-12-25
Ransomware UseKnown
Affected Products
cyberpanel:cyberpanel
Weaknesses (CWE)
CWE-78CWE-78
References
https://cwe.mitre.org/data/definitions/420.html(cve@mitre.org)
https://cwe.mitre.org/data/definitions/78.html(cve@mitre.org)
https://cyberpanel.net/KnowledgeBase/home/change-logs/(cve@mitre.org)
https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel(cve@mitre.org)
https://github.com/usmannasir/cyberpanel/commit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-51378(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.