In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 12 Apr 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-862 | |
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-12T00:06:13.609Z
Reserved: 2021-12-23T00:00:00.000Z
Link: CVE-2021-45467
Updated: 2024-08-04T04:39:21.084Z
Status : Modified
Published: 2022-12-26T05:15:10.867
Modified: 2025-04-12T01:15:14.540
Link: CVE-2021-45467
No data.
OpenCVE Enrichment
No data.
Weaknesses