CVE-2021-45467: Control Web Panel (CWP) – File Inclusion

CVE-2021-45467: Control Web Panel (CWP) - File Inclusion-渗透云记 - 专注于网络安全与技术分享
CVE-2021-45467: Control Web Panel (CWP) – File Inclusion
此内容为付费阅读,请付费后查看
100积分
付费阅读

漏洞标题

CVE-2021-45467: Control Web Panel (CWP) – File Inclusion

漏洞描述

In CWP (Control Web Panel, previously CentOS Web Panel) before version 0.9.8.1107, an unauthenticated attacker can abuse null byte (%00) injection with the "scripts" parameter in the /user/loader.php or /user/login.php endpoints to register arbitrary API keys or access sensitive files. This can be exploited by using multiple %00 sequences to traverse directories via crafted requests such as /user/loader.php?api=1&scripts=.%00./.%00./api/account_new_create&acc=guadaapi, or similar payloads with more %00 instances (e.g., .%00%00%00./.%00%00%00./api/account_new_create). Attackers may use this flaw for arbitrary file access, privilege escalation, or remote code execution.

PoC代码

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享