vendor:
Control Web Panel (CWP)
by:
Mayank Deshmukh
9.8
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: Control Web Panel (CWP)
Affected Version From: version < 0.9.8.1147
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2022-44877
CPE: a:control_web_panel:control_web_panel:0.9.8.1147
Tags: packetstorm,cve,cve2022,centos,rce,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://twitter.com/_0xf4n9x_/status/1612068225046675457, https://github.com/numanturle/CVE-2022-44877, https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386, https://nvd.nist.gov/vuln/detail/CVE-2022-44877, http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.title:"Login | Control WebPanel"', 'verified': True, 'vendor': 'control-webpanel', 'product': 'webpanel'}
Platforms Tested: Kali Linux
2023
Control Web Panel 7 (CWP7) v0.9.8.1147 – Remote Code Execution (RCE)
This exploit allows an attacker to execute arbitrary code on a vulnerable Control Web Panel (CWP) version 0.9.8.1147 and below. By sending a specially crafted request to the /login/index.php endpoint, the attacker can inject a malicious cURL command that will be executed by the server. This can lead to unauthorized access, data leakage, and further compromise of the system.
Mitigation:
To mitigate this vulnerability, it is recommended to update to the latest version of Control Web Panel (CWP) which has addressed this issue. Additionally, it is advised to implement proper input validation and sanitization to prevent command injection attacks.