CVE-2024-51567

Published Oct 29, 2024

Last updated 9 days ago

Overview

Description
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
CyberPanel Incorrect Default Permissions Vulnerability
Exploit added on
Nov 7, 2024
Exploit action due
Nov 28, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-306
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-276

Social media

Hype score
Not currently trending
  1. CVE-2024-51567 has been classified as a CISA Known Exploited Vulnerability (KEV) related to CyberPanel. Know more about it and act now to safeguard your organization: https://t.co/WsiZvtQqwn #KEV #CyberSecurity #CVE #VulnerabilityManagement #CISO #Attaxion https://t.co/yRxywr

    @attaxion

    13 Nov 2024

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. #DOYOUKNOWCVE CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. CVE-2024-51567: CyberPanel Incorrect Default Permissions. A permissions misconfiguration in CyberPanel allows unauthorized users to escalate privileges or access sensitive data.…

    @Loginsoft_Inc

    8 Nov 2024

    37 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  3. CISA Alert: Active Exploitation of Critical Flaws 🚨 CISA warns of high-risk vulnerabilities: Palo Alto Expedition (CVE-2024-5910) Android (CVE-2024-43093) CyberPanel (CVE-2024-51567) Federal agencies advised to patch by Nov 28. #Cybersecurity #CISA #PaloAlto #Vulnerability ht

    @redfoxsec

    8 Nov 2024

    57 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-51567 #CyberPanel Incorrect Default Permissions Vulnerability https://t.co/8uS0TanWTv

    @ScyScan

    7 Nov 2024

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Cyber Panel-də təhlükəsizlik boşluğu (CVE-2024-51567) aşkar olunub. #ETX #certaz #cybersecurity #kibertəhlükəsizlik #xəbərdarlıq https://t.co/7Sl4LlYHyD

    @CERTAzerbaijan

    7 Nov 2024

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2024-51378 is getting exploited #inthewild. Find out more at https://t.co/9I24IDM7Wd CVE-2024-51567 is getting exploited #inthewild. Find out more at https://t.co/CHMCRKe7PP

    @inthewildio

    1 Nov 2024

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. #DOYOUKNOWCVE PSAUX ransomware is targeting two critical vulnerabilities in CyberPanel—CVE-2024-51567 & CVE-2024-51568. CVE-2024-51567: Allows attackers to bypass authentication via the upgrademysqlstatus function. For more information: https://t.co/JC47FB76qm CVE-2024-51

    @Loginsoft_Inc

    1 Nov 2024

    87 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. CyberPanel: several critical zero-click unauthenticated root RCE URL: https://t.co/Uk76cNb5qv Classification: Critical, Solution: Temporary Fix, Exploit Maturity: High, CVSSv3.1: 10.0 CVEs: CVE-2024-51567, CVE-2024-51568, CVE-2024-51378 See also: - https://t.co/ewewfhR92l #cyberp

    @CharyyevPerman

    31 Oct 2024

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. PSAUX Ransomware exploits CyberPanel Vulnerabilities #PSAUXRansomware #CyberPanel #CVE-2024-51567 #CVE-2024-51568 #CVE-2024-51378 https://t.co/0c1xcVAZmm

    @pravin_karthik

    30 Oct 2024

    75 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  10. PSAUX Ransomware is Exploiting Two Max Severity Flaws (CVE-2024-51567, CVE-2024-51568) in CyberPanel https://t.co/tuLmiS0Apl

    @Dinosn

    30 Oct 2024

    2161 Impressions

    3 Retweets

    12 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  11. PSAUX Ransomware is Exploiting Two Max Severity Flaws (CVE-2024-51567, CVE-2024-51568) in CyberPanel https://t.co/LxqvoGcI4f Three critical remote code execution (RCE) vulnerabilities impacting CyberPanel, a widely used web hosting control panel, are under active exploitation.…

    @f1tym1

    30 Oct 2024

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. [CVE-2024-51567: CRITICAL] CyberPanel vulnerability in upgrademysqlstatus allows remote attackers to bypass authentication & execute arbitrary commands via shell metacharacters. Patched versions available.#cybersecurity,#vulnerability https://t.co/BawgspqKmC https://t.co/Etkj

    @CveFindCom

    29 Oct 2024

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. CVE-2024-51567 upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary command… https://t.co/HLZnqlRzVw

    @CVEnew

    29 Oct 2024

    532 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations