The following CentOS Web Panel is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since a vulnerability allow remote attackers to achieve RCE (Remote code execution) on the service. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: b200c4085dcca515084ebea24b907d604b907d604b907d604b907d604b907d60
Found outdated CentOS Web Panel vulnerable to RCE Found CVE-2022-44877
The following CentOS Web Panel is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since a vulnerability allow remote attackers to achieve RCE (Remote code execution) on the service. Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: b200c4085dcca515084ebea24b907d604b907d604b907d604b907d604b907d60
Found outdated CentOS Web Panel vulnerable to RCE Found CVE-2022-44877
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491bf8f6062aa22f2e9b0e5b3b2167d0c45167d0c45167d0c45
Found host file through Apache traversal: 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 127.0.0.1 autoreply.server.qatarvoice.com 45.61.54.139 server.qatarvoice.com
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491bf8f6062aa22f2e9b0e5b3b2167d0c45167d0c45167d0c45
Found host file through Apache traversal: 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 127.0.0.1 autoreply.server.qatarvoice.com 45.61.54.139 server.qatarvoice.com