HTTP: Cyber Panel Upgrade Mysqlstatus Remote Code Execution

This signature detects attempts to exploit a known vulnerability against CyberPanel. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.

Affected Products

Cyberpanel cyberpanel

Short Name
HTTP:CTS:CYBERPANEL-MSQL-RCE
Severity
Critical
Recommended
True
Recommended Action
None
Category
HTTP
Keywords
CVE-2024-51567 Code Cyber Execution Mysqlstatus Panel Remote Upgrade
Release Date
03/20/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3824
False Positive
Unknown
Vendors

Cyberpanel

Found a potential security threat?