[ authorization ] [ registration ] [ Восстановление ]
Свяжитесь с нами
Вы можете связаться с нами по:
0day.today   магазин эксплоитов и 0day база данных эксплоитов

aaPanel 6.6.6 - Privilege Escalation & Remote Code Execution (Authenticated) Exploit

Автор
Ünsal Furkan Harani
Риск
[
Security Risk Critical
]
0day-ID
0day-ID-35044
Категория
web applications
Дата добавления
16-10-2020
Платформа
python
# Exploit Title: [aaPanel 6.6.6 - Authenticated Privilege Escalation]
# Exploit Author: [Ünsal Furkan Harani (Zemarkhos)]
# Vendor Homepage: [https://www.aapanel.com/](https://www.aapanel.com/)
# Software Link: [https://github.com/aaPanel/aaPanel](https://github.com/aaPanel/aaPanel)
# Version: [6.6.6] (REQUIRED)
# Tested on: [Linux ubuntu 4.4.0-131-generic #157-Ubuntu SMP Thu Jul 12 15:51:36 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux]
# CVE : [CVE-2020-14421]

if you are logged was admin;

1- go to the crontab

2- select shell script and paste your reverse shell code

3- click execute button and you are now root.

because crontab.py running with root privileges.

Remote Code Execution

https://github.com/jenaye/aapanel

#  0day.today [2024-07-04]  #