[ authorization ] [ registration ] [ Ripristina ]
Contattaci
Ci puoi contattare tramite:
0day.today Exploits Market and 0day Exploits Database

aaPanel 6.6.6 - Privilege Escalation & Remote Code Execution (Authenticated) Exploit

Autore
Ünsal Furkan Harani
Rischio
[
Security Risk Critical
]
0day-ID
0day-ID-35044
Categoria
web applications
Data inserimento
16-10-2020
Piattaforma
python
# Exploit Title: [aaPanel 6.6.6 - Authenticated Privilege Escalation]
# Exploit Author: [Ünsal Furkan Harani (Zemarkhos)]
# Vendor Homepage: [https://www.aapanel.com/](https://www.aapanel.com/)
# Software Link: [https://github.com/aaPanel/aaPanel](https://github.com/aaPanel/aaPanel)
# Version: [6.6.6] (REQUIRED)
# Tested on: [Linux ubuntu 4.4.0-131-generic #157-Ubuntu SMP Thu Jul 12 15:51:36 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux]
# CVE : [CVE-2020-14421]

if you are logged was admin;

1- go to the crontab

2- select shell script and paste your reverse shell code

3- click execute button and you are now root.

because crontab.py running with root privileges.

Remote Code Execution

https://github.com/jenaye/aapanel

#  0day.today [2024-07-02]  #