Description
A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an authenticated attacker can execute arbitrary system commands. Exploitation requires a valid ZPanel account—such as one in the default Users, Resellers, or Administrators groups—but no elevated privileges.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
* (semver)
Credits
shachibista
References
web.archive.org/...mote-Execution-Exploit-in-Zpanel-10-0-0-2
raw.githubusercontent.com/.../webapp/zpanel_username_exec.rb
web.archive.org/...mote-Execution-Exploit-in-Zpanel-10-0-0-2
github.com/zpanel/zpanelx
www.vulncheck.com/...asswd-module-username-command-execution