Description
CyberPanel 2.1 contains a command execution vulnerability that allows authenticated attackers to read arbitrary files and execute remote code by exploiting symlink attacks through the filemanager controller endpoint. Attackers can manipulate the completeStartingPath parameter in POST requests to /filemanager/controller to create symbolic links, read sensitive files like database credentials, and execute arbitrary shell commands through the /websites/fetchFolderDetails endpoint.
Problem types
Improper Link Resolution Before File Access ('Link Following')
Product status
Credits
Numan Türle
References
www.exploit-db.com/exploits/50230 (ExploitDB-50230)
cyberpanel.net/ (Official Product Homepage)
github.com/usmannasir/cyberpanel (Product Reference)
www.vulncheck.com/...emote-code-execution-via-symlink-attack (VulnCheck Advisory: CyberPanel 2.1 Authenticated Remote Code Execution via Symlink Attack)