First published: Fri May 03 2024(Updated: )
Control Web Panel dns_zone_editor Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Control Web Panel. Authentication is required to exploit this vulnerability. The specific flaw exists within the dns_zone_editor module. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20581.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Web Panel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42120 has a high severity level due to its ability to allow remote code execution.
CVE-2023-42120 exploits a command injection vulnerability in the dns_zone_editor functionality of Control Web Panel.
CVE-2023-42120 affects installations of Control Web Panel, particularly those with the dns_zone_editor feature.
To address CVE-2023-42120, it is recommended to apply the latest security patches provided by Control Web Panel.
Yes, CVE-2023-42120 requires authentication to exploit the command injection vulnerability.