EIP-4ab5e9b4
Softaculous Webuzo contains a command injection vulnerability in the FTP management functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system.
Vulnerability Identifier
- Exodus Intelligence: EIP-4ab5e9b4
- MITRE: CVE-2024-24623
Vulnerability Metrics
- CVSSv2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
- CVSSv2 Score: 9.0
Vendor References
- https://webuzo.com/blog/webuzo-4-2-9-launched/
Discovery Credit
- Exodus Intelligence
Disclosure Timeline
- Disclosed to vendor: July 11, 2024
- Patched by vendor: July 12, 2024
- Disclosed to public: July 25, 2024
Further Information
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected]
The post Softaculous Webuzo FTP Management Command Injection appeared first on Exodus Intelligence.
Related Posts
Softaculous Webuzo Password Reset Command Injection
Softaculous Webuzo Authentication Bypass
Motorola MR2600 ‘SaveSysLogParams’ Command Injection Vulnerability
Motorola MR2600 ‘SaveStaticRouteIPv6Params’ Command Injection Vulnerability
Motorola MR2600 ‘SaveStaticRouteIPv4Params’ Command Injection Vulnerability
Is Telegram really an encrypted messaging app?
DeepINTEL 2024 – a full Day all about Security Intelligence
D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
D-Link DAP-1650 gena.cgi SUBSCRIBE Command Injection Vulnerability
A first look at Android 14 forensics
Windows Sockets: From Registered I/O to SYSTEM Privileges
When Speed Matters: Imaging Fast NVMe Drives
Top 5 Tech Trends at CES 2025
To Schnorr and beyond (part 2)
To Schnorr and beyond (Part 1)
Sysdiagnose in iOS 16: a first look from a Digital Forensics perspective
Some rough impressions of Worldcoin
Sideloading Low-Level Extraction Agent with Regular Apple IDs from Windows and Linux
Remarks on “Chat Control”
PRFs, PRPs and other fantastic things