login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.youtube.com/watch?v=kiLfSvc1SYY | third party advisory exploit |
https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386 | third party advisory exploit |
http://seclists.org/fulldisclosure/2023/Jan/1 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html | exploit vdb entry third party advisory |