vendor:
ZPanel
by:
Anonymous
8,8
CVSS
HIGH
Arbitrary Code Execution
94
CWE
Product Name: ZPanel
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2020
Arbitrary Code Execution in ZPanel
ZPanel uses a poor templater system that consists of a few str_replace calls and an eval, which does a very poor job at preventing malicious code. By effectively injecting the replacement that occurs in line 71, one can run arbitrary PHP code. When combined with ZPanels `zsudo` binary, one can execute arbitrary commands as root, with a maximum of 5 additional arguments.
Mitigation:
The development team should implement a secure templater system that prevents malicious code.