Skip to content

Commit 22ade4f

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 8ac7348 commit 22ade4f

File tree

1 file changed

+82
-0
lines changed

1 file changed

+82
-0
lines changed

db/modules_metadata_base.json

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129294,6 +129294,88 @@
129294129294
"session_types": false,
129295129295
"needs_cleanup": null
129296129296
},
129297+
"exploit_unix/webapp/cyberpanel_preauth_rce_multi_cve": {
129298+
"name": "CyberPanel Multi CVE Pre-auth RCE",
129299+
"fullname": "exploit/unix/webapp/cyberpanel_preauth_rce_multi_cve",
129300+
"aliases": [
129301+
129302+
],
129303+
"rank": 600,
129304+
"disclosure_date": "2024-10-27",
129305+
"type": "exploit",
129306+
"author": [
129307+
"DreyAnd",
129308+
"Valentin Lobstein",
129309+
"Luka Petrovic (refr4g)"
129310+
],
129311+
"description": "This module exploits three separate unauthenticated Remote Code Execution vulnerabilities in CyberPanel:\n\n - CVE-2024-51567: Command injection vulnerability in the \"upgrademysqlstatus\" endpoint.\n - CVE-2024-51568: Command Injection via the \"completePath\" parameter in the \"outputExecutioner\" sink.\n - CVE-2024-51378: Unauthenticated RCE in \"/ftp/getresetstatus\" and \"/dns/getresetstatus\".\n\n These vulnerabilities were exploited in ransomware campaigns affecting over 22,000 CyberPanel instances, with the PSAUX ransomware being the primary actor in these attacks.",
129312+
"references": [
129313+
"CVE-2024-51567",
129314+
"CVE-2024-51568",
129315+
"CVE-2024-51378",
129316+
"URL-https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce",
129317+
"URL-https://refr4g.github.io/posts/cyberpanel-command-injection-vulnerability/",
129318+
"URL-https://github.com/DreyAnd/CyberPanel-RCE",
129319+
"URL-https://github.com/refr4g/CVE-2024-51378",
129320+
"URL-https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/",
129321+
"URL-https://gist.github.com/gboddin/d78823245b518edd54bfc2301c5f8882"
129322+
],
129323+
"platform": "Linux,Unix",
129324+
"arch": "cmd",
129325+
"rport": 8090,
129326+
"autofilter_ports": [
129327+
80,
129328+
8080,
129329+
443,
129330+
8000,
129331+
8888,
129332+
8880,
129333+
8008,
129334+
3000,
129335+
8443
129336+
],
129337+
"autofilter_services": [
129338+
"http",
129339+
"https"
129340+
],
129341+
"targets": [
129342+
"Unix/Linux Command Shell"
129343+
],
129344+
"mod_time": "2024-12-05 16:05:25 +0000",
129345+
"path": "/modules/exploits/unix/webapp/cyberpanel_preauth_rce_multi_cve.rb",
129346+
"is_install_path": true,
129347+
"ref_name": "unix/webapp/cyberpanel_preauth_rce_multi_cve",
129348+
"check": true,
129349+
"post_auth": false,
129350+
"default_credential": false,
129351+
"notes": {
129352+
"Stability": [
129353+
"crash-safe"
129354+
],
129355+
"Reliability": [
129356+
"repeatable-session"
129357+
],
129358+
"SideEffects": [
129359+
"ioc-in-logs"
129360+
]
129361+
},
129362+
"session_types": false,
129363+
"needs_cleanup": null,
129364+
"actions": [
129365+
{
129366+
"name": "CVE-2024-51378",
129367+
"description": "Exploit using CVE-2024-51378"
129368+
},
129369+
{
129370+
"name": "CVE-2024-51567",
129371+
"description": "Exploit using CVE-2024-51567"
129372+
},
129373+
{
129374+
"name": "CVE-2024-51568",
129375+
"description": "Exploit using CVE-2024-51568"
129376+
}
129377+
]
129378+
},
129297129379
"exploit_unix/webapp/datalife_preview_exec": {
129298129380
"name": "DataLife Engine preview.php PHP Code Injection",
129299129381
"fullname": "exploit/unix/webapp/datalife_preview_exec",

0 commit comments

Comments
 (0)