CVE-2023-42122
Control Web Panel vulnerability analysis and mitigation

Control Web Panel wloggui Command Injection Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Control Web Panel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the cwpsrv process, which listens on the loopback interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-21079.


SourceNVD

Related Control Web Panel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-42121CRITICAL9.8
  • Control Web PanelControl Web Panel
  • cpe:2.3:a:control-webpanel:webpanel
NoYesMay 03, 2024
CVE-2022-44877CRITICAL9.8
  • Control Web PanelControl Web Panel
  • cpe:2.3:a:centos-webpanel:centos_web_panel
YesYesJan 05, 2023
CVE-2023-42123HIGH8.8
  • Control Web PanelControl Web Panel
  • cpe:2.3:a:control-webpanel:webpanel
NoYesMay 03, 2024
CVE-2023-42120HIGH8.8
  • Control Web PanelControl Web Panel
  • cpe:2.3:a:control-webpanel:webpanel
NoYesMay 03, 2024
CVE-2023-42122HIGH7.8
  • Control Web PanelControl Web Panel
  • cpe:2.3:a:control-webpanel:webpanel
NoYesMay 03, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management