← Retour aux CVEs
CVE-2024-51378
CRITICALCISA KEV10.0
Description
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Details CVE
Score CVSS v3.110.0
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/29/2024
Derniere modification11/7/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurCyberPersons
ProduitCyberPanel
Nom vulnerabiliteCyberPanel Incorrect Default Permissions Vulnerability
Date ajout KEV2024-12-04
Date limite remediation2024-12-25
Utilise dans ransomwareKnown
Produits affectes
cyberpanel:cyberpanel
Faiblesses (CWE)
CWE-78CWE-78
References
https://cwe.mitre.org/data/definitions/420.html(cve@mitre.org)
https://cwe.mitre.org/data/definitions/78.html(cve@mitre.org)
https://cyberpanel.net/KnowledgeBase/home/change-logs/(cve@mitre.org)
https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel(cve@mitre.org)
https://github.com/usmannasir/cyberpanel/commit/1c0c6cbcf71abe573da0b5fddfb9603e7477f683(cve@mitre.org)
https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-51378(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.