![]() |
[CVE-2024-51378] CyberPanel Pre-Auth RCE via Command Injection - Printable Version +- DarkForums (https://darkforums.st) +-- Forum: Hacking (https://darkforums.st/Forum-Hacking) +--- Forum: Exploit & POCs (https://darkforums.st/Forum-Exploit-POCs) +--- Thread: [CVE-2024-51378] CyberPanel Pre-Auth RCE via Command Injection (/Thread-CVE-2024-51378-CyberPanel-Pre-Auth-RCE-via-Command-Injection) |
[CVE-2024-51378] CyberPanel Pre-Auth RCE via Command Injection - cache - 14-06-25 getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected. Exploit Code: Code: #!/usr/bin/python3 |