vendor:
ZesleCP
by:
Numan Türle
9,8
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: ZesleCP
Affected Version From: 3.1.9
Affected Version To: 3.1.9
Patch Exists: YES
Related CWE: None
CPE: a:zeslecp:zeslecp:3.1.9
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2021
ZesleCP 3.1.9 – Remote Code Execution (RCE) (Authenticated)
ZesleCP 3.1.9 is vulnerable to Remote Code Execution (RCE) when an authenticated user sends a malicious payload to the /json-api/cpanel endpoint. The payload creates a FTP account with a malicious command that is executed when the FTP account is created. This allows an attacker to execute arbitrary code on the server.
Mitigation:
Ensure that all users have strong passwords and that only trusted users have access to the system. Additionally, ensure that all software is up to date and patched.