Lucene search

K
thnThe Hacker NewsTHN:51E8D73A9E767BAD5C78573DFEF988E5
HistoryJan 12, 2023 - 6:48 a.m.

Alert: Hackers Actively Exploiting Critical "Control Web Panel" RCE Vulnerability

2023-01-1206:48:00
The Hacker News
thehackernews.com
45
control web panel
rce vulnerability
cve-2022-44877
exploit
patch
hacker
server administration

0.974 High

EPSS

Percentile

99.9%

Control Web Panel

Malicious actors are actively attempting to exploit a recently patched critical vulnerability in Control Web Panel (CWP) that enables elevated privileges and unauthenticated remote code execution (RCE) on susceptible servers.

Tracked as CVE-2022-44877 (CVSS score: 9.8), the bug impacts all versions of the software before 0.9.8.1147 and was patched by its maintainers on October 25, 2022.

Control Web Panel, formerly known as CentOS Web Panel, is a popular server administration tool for enterprise-based Linux systems.

β€œlogin/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter,” according to NIST.

Gais Security researcher Numan Turle has been credited with discovering and reporting the flaw to the Control Web Panel developers.

Exploitation of the flaw is said to have commenced on January 6, 2023, following the availability of a proof-of-concept (PoC), the Shadowserver Foundation and GreyNoise disclosed.

β€œThis is an unauthenticated RCE,” Shadowserver said in a series of tweets, adding, β€œexploitation is trivial.”

GreyNoise said that it has observed four unique IP addresses attempting to exploit CVE-2022-44877 to date, two of which are located in the U.S. and one each from the Netherlands and Thailand.

In light of active exploitation in the wild, users reliant on the software are advised to apply the patches to mitigate potential threats.

This is not the first time similar flaws have been discovered in CWP. In January 2022, two critical issues were identified in the hosting panel that could have been weaponized to achieve pre-authenticated remote code execution.

Found this article interesting? Follow us on Twitter ο‚™ and LinkedIn to read more exclusive content we post.