POC详情: c16135b438b21d703fd8ba615d9f17b898801f75

来源
关联漏洞
标题: CWP Panel 代码注入漏洞 (CVE-2021-45467)
描述:CWP Panel是CWP公司的一个现代和先进的 Linux 控制面板。适用于网络托管服务提供商和系统管理员。 CWP Panel el8-latest 存在代码注入漏洞,该漏洞可能允许远程攻击者在受影响的系统上执行任意代码。
描述
In CWP (Control Web Panel, previously CentOS Web Panel) before version 0.9.8.1107, an unauthenticated attacker can abuse null byte (%00) injection with the "scripts" parameter in the /user/loader.php or /user/login.php endpoints to register arbitrary API keys or access sensitive files. This can be exploited by using multiple %00 sequences to traverse directories via crafted requests such as /user/loader.php?api=1&scripts=.%00./.%00./api/account_new_create&acc=guadaapi, or similar payloads with more %00 instances (e.g., .%00%00%00./.%00%00%00./api/account_new_create). Attackers may use this flaw for arbitrary file access, privilege escalation, or remote code execution.
文件快照

id: CVE-2021-45467 info: name: Control Web Panel (CWP) - File Inclusion author: ritikchaddha ...
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。