Lucene search

K
rapid7blogCaitlin CondonRAPID7BLOG:27CF7EAAAAEE2DDF08B02508744C8ADA
HistoryJan 19, 2023 - 7:04 p.m.

Exploitation of Control Web Panel CVE-2022-44877

2023-01-1919:04:48
Caitlin Condon
blog.rapid7.com
29
cve-2022-44877
control web panel
remote code execution
security advisory
upgrade
exploitation
insightvm
nexpose
rapid7
shadowserver
greynoise
bash commands
web servers

0.974 High

EPSS

Percentile

99.9%

Exploitation of Control Web Panel CVE-2022-44877

On January 3, 2023, security researcher Numan Türle published a proof-of-concept exploit for CVE-2022-44877, an unauthenticated remote code execution vulnerability in Control Web Panel (CWP, formerly known as CentOS Web Panel) that had been fixed in an October 2022 release of CWP. The vulnerability arises from a condition that allows attackers to run bash commands when double quotes are used to log incorrect entries to the system. Successful exploitation allows remote attackers to execute arbitrary operating system commands via shell metacharacters in the login parameter (login/index.php).

On January 6, 2023, security nonprofit Shadowserver reported exploitation in the wild. As of January 19, 2023, security firm GreyNoise has also seen several IP addresses exploiting CVE-2022-44877.

Control Web Panel is a popular free interface for managing web servers; Shadowserver’s dashboard for CWP identifies tens of thousands of instances on the internet. There doesn’t appear to be a detailed vendor advisory for CVE-2022-44887, but available information indicates Control Web Panel 7 (CWP 7) versions before 0.9.8.1147 are vulnerable. CWP users should upgrade their versions to 0.9.8.1147 or later as soon as possible.

Rapid7 customers

InsightVM & Nexpose customers: An authenticated vulnerability check for CVE-2022-44877 was made available in the January 19 content release.