EIP-ce40b086
Softaculous Webuzo contains an authentication bypass vulnerability through the password reset functionality. Remote, anonymous attackers can exploit this vulnerability to gain full server access as the root user.
Vulnerability Identifier
- Exodus Intelligence: EIP-ce40b086
- MITRE: CVE-2024-24621
Vulnerability Metrics
- CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
- CVSSv2 Score: 10.0
Vendor References
- https://webuzo.com/blog/webuzo-4-2-9-launched/
Discovery Credit
- Exodus Intelligence
Disclosure Timeline
- Disclosed to vendor: July 11, 2024
- Patched by vendor: July 12, 2024
- Disclosed to public: July 25, 2024
Further Information
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected]
The post Softaculous Webuzo Authentication Bypass appeared first on Exodus Intelligence.
Related Posts
Softaculous Webuzo Password Reset Command Injection
Softaculous Webuzo FTP Management Command Injection
Motorola MR2600 ‘SaveSysLogParams’ Command Injection Vulnerability
Motorola MR2600 ‘SaveStaticRouteIPv6Params’ Command Injection Vulnerability
Motorola MR2600 ‘SaveStaticRouteIPv4Params’ Command Injection Vulnerability
Is Telegram really an encrypted messaging app?
DeepINTEL 2024 – a full Day all about Security Intelligence
D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
D-Link DAP-1650 gena.cgi SUBSCRIBE Command Injection Vulnerability
A first look at Android 14 forensics
Windows Sockets: From Registered I/O to SYSTEM Privileges
When Speed Matters: Imaging Fast NVMe Drives
Top 5 Tech Trends at CES 2025
To Schnorr and beyond (part 2)
To Schnorr and beyond (Part 1)
Sysdiagnose in iOS 16: a first look from a Digital Forensics perspective
Some rough impressions of Worldcoin
Sideloading Low-Level Extraction Agent with Regular Apple IDs from Windows and Linux
Remarks on “Chat Control”
PRFs, PRPs and other fantastic things