{"id":1486,"date":"2024-10-29T15:49:29","date_gmt":"2024-10-29T08:49:29","guid":{"rendered":"https:\/\/focusnic.com\/blog\/?p=1486"},"modified":"2024-11-22T23:42:08","modified_gmt":"2024-11-22T16:42:08","slug":"cyberpanel-v236-vulnerability-remote-code-execution-rce","status":"publish","type":"post","link":"https:\/\/focusnic.com\/blog\/cyberpanel-v236-vulnerability-remote-code-execution-rce\/","title":{"rendered":"CyberPanel v2.3.6 Vulnerability Remote Code Execution (RCE)"},"content":{"rendered":"\n<p>CyberPanel v2.3.6 memiliki kelemahan Remote Code Execution (RCE) atau eksekusi kode jarak jauh  pra-otorisasi yang memungkinkan mengeksekusi perintah di server dengan hak akses root.<\/p>\n\n\n\n<p>Berikut adalah ringkasan yang bisa kami simpulkan<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kelemahan ini disebabkan karena kurangnya pengecekan otorisasi pada API <strong>\/dataBases\/upgrademysqlstatus<\/strong>, yang memungkinkan melampirkan payload injeksi perintah melalui parameter &#8220;statusfile&#8221; meski menggunakan metode HTTP selain POST.<\/li>\n\n\n\n<li>Lokasi seperti <strong>\/filemanager\/upload<\/strong> juga ditemukan kurang otorisasi dan mengizinkan eksekusi perintah atau unggahan file tanpa otorisasi.<\/li>\n\n\n\n<li>Middleware keamanan yang diimplementasikan dapat dielakkan dengan memanfaatkan bahwa middleware hanya memeriksa injeksi untuk permintaan <strong>POST<\/strong>, sedangkan endpoint rawan menerima payload melalui metode lain.<\/li>\n\n\n\n<li>Security  challenges tambahan disediakan untuk menemukan kerentanan lain, seperti bug penciptaan file yang dapat memungkinkan injeksi perintah di <strong>restoreStatus<\/strong> atau <strong>backupStatus<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Bagaimana Cara Patch atau Update CyberPanel?<\/h2>\n\n\n\n<p>Untuk mengatasi kerentanan ini Anda bisa melakukan backup atau snapshot pada server Anda untuk berjaga-jaga apabila terdapat issue pada website Anda ketika melakukan upgrade versi, lalu silahkan buka dashboard CyberPanel untuk melihat versi CyberPanel saat ini melalui menu <strong>Version Management<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"776\" height=\"663\" src=\"https:\/\/focusnic.com\/blog\/wp-content\/uploads\/2024\/10\/image-2.png\" alt=\"\" class=\"wp-image-1488\" title=\"\" srcset=\"https:\/\/focusnic.com\/blog\/wp-content\/uploads\/2024\/10\/image-2.png 776w, https:\/\/focusnic.com\/blog\/wp-content\/uploads\/2024\/10\/image-2-300x256.png 300w, https:\/\/focusnic.com\/blog\/wp-content\/uploads\/2024\/10\/image-2-768x656.png 768w, https:\/\/focusnic.com\/blog\/wp-content\/uploads\/2024\/10\/image-2-450x384.png 450w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><\/figure>\n\n\n\n<p>Apabila Anda menggunakan CyberPanel versi 2.3.6 maka sangat disarankan untuk melakukan upgrade ke versi 2.3.7 dengan cara memilih versi 2.3.7 lalu klik <strong>Upgrade CyberPanel to selected branch<\/strong><\/p>\n\n\n\n<p>Untuk lebih detail mengenai celah keamanan pada CyberPanel v 2.3.6 Anda dapat melihat artikel berikut:<\/p>\n\n\n\n<p><a href=\"https:\/\/dreyand.rs\/code\/review\/2024\/10\/27\/what-are-my-options-cyberpanel-v236-pre-auth-rce\" target=\"_blank\" rel=\"noopener\">https:\/\/dreyand.rs\/code\/review\/2024\/10\/27\/what-are-my-options-cyberpanel-v236-pre-auth-rce<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/community.cyberpanel.net\/t\/critical-security-alert-vulnerable-cyberpanel-instance-detected-on-your-network\/56021\" target=\"_blank\" rel=\"noopener\">https:\/\/community.cyberpanel.net\/t\/critical-security-alert-vulnerable-cyberpanel-instance-detected-on-your-network\/56021<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberPanel v2.3.6 memiliki kelemahan Remote Code Execution (RCE) atau eksekusi kode jarak jauh pra-otorisasi yang memungkinkan mengeksekusi perintah di server dengan hak akses root. Berikut adalah ringkasan yang bisa kami simpulkan Bagaimana Cara Patch atau Update CyberPanel? Untuk mengatasi kerentanan ini Anda bisa melakukan backup atau snapshot pada server Anda untuk berjaga-jaga apabila terdapat issue [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1487,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102],"tags":[],"class_list":{"0":"post-1486","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-berita-industri"},"_links":{"self":[{"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/posts\/1486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/comments?post=1486"}],"version-history":[{"count":3,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/posts\/1486\/revisions"}],"predecessor-version":[{"id":1491,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/posts\/1486\/revisions\/1491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/media\/1487"}],"wp:attachment":[{"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/media?parent=1486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/categories?post=1486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/focusnic.com\/blog\/wp-json\/wp\/v2\/tags?post=1486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}