CVE-2021-31324 Scanner

CVE-2021-31324 Scanner - OS Command Injection vulnerability in CentOS Web Panel

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

16 days 7 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

CentOS Web Panel (CWP) is a widely used web hosting control panel designed to provide an intuitive interface for managing server resources and websites. It is utilized by system administrators and hosting providers for tasks like domain management, file management, and server monitoring. Its simplicity and feature set make it a popular choice for hosting environments, especially in Linux-based infrastructures.

The detected vulnerability is an OS Command Injection flaw in the unprivileged user portal of CentOS Web Panel. This vulnerability allows attackers to execute arbitrary OS commands with root privileges remotely. Exploitation requires sending specially crafted HTTP requests, enabling attackers to compromise the server fully.

The technical details of this vulnerability reveal that the `idsession` parameter in the `login/index.php` endpoint is improperly sanitized. Attackers can inject malicious commands using this parameter, which are executed with root privileges due to improper input validation. This vulnerability is critical because it allows remote code execution with minimal effort.

If exploited, this vulnerability can lead to full system compromise, including unauthorized access to sensitive data, server control, and potential deployment of malware. It poses a severe risk to the confidentiality, integrity, and availability of the server and hosted services.

REFERENCES

Get started to protecting your Free Full Security Scan