DIVD-2023-00003 - OS command injection in CentOS CWP
|Case lead||Max van der Horst|
|Product||CentOS Control Web Panel 7|
|Recommendation||Upgrade to the latest version of CentOS CWP.|
|Last modified||08 Mar 2023 16:08|
An unauthenticated OS Command Injection vulnerability has been identified inside CentOS CWP 7 before version 0.9.8.1147. The login/index.php endpoint contains a vulnerable parameter, allowing unauthenticated attackers to execute bash commands. Misuse of this vulnerability could lead to the compromise of your system.
What you can do
Upgrade your CentOS CWP version to the patched version of 0.9.8.1147 or 0.9.8.1149 (latest).
What we are doing
DIVD is currently working to identify vulnerable parties and notify these. We do this by scanning for exposed CWP instances and examining this instance to determine whether the vulnerability is present. Owners of vulnerable instances receive a notification with the host information and remediation steps.
|06 Jan 2023||Proof of Concept published on Github|
|11 Jan 2023||DIVD starts research on this vulnerability.|
|20 Jan 2023||DIVD conducts first scan.|
|12 Feb 2023||DIVD sends first round of notifications.|
|22 Feb 2023||DIVD closes case.|