Advisory Details

September 27th, 2023

(0Day) Control Web Panel dns_zone_editor Command Injection Remote Code Execution Vulnerability

ZDI-23-1477
ZDI-CAN-20581

CVE ID CVE-2023-42120
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Control Web Panel
AFFECTED PRODUCTS Control Web Panel
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Control Web Panel. Authentication is required to exploit this vulnerability.

The specific flaw exists within the dns_zone_editor module. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

05/09/23 – ZDI requested a PSIRT contact.

05/10/23 – The vendor provided a contact, and ZDI reported the vulnerability to the vendor.

09/22/23 – ZDI asked for an update and informed the vendor that we intend to publish the case as a zero-day advisory on 09/27/23.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2023-05-10 - Vulnerability reported to vendor
  • 2023-09-27 - Coordinated public release of advisory
CREDIT Muhammad Ikhsanudin
BACK TO ADVISORIES