Finding Control Web Panel (CWP) instances

(updated ), by Pearce Barry
icon
Rumble, Inc. is now runZero!

Rumble Network Discovery is now runZero!

Security researcher Paulos Yibelo shared findings this week on two new vulnerabilities within the popular Control Web Panel (formerly CentOS Web Panel) web hosting management software. Both CVE-2021-45466 (a file write vulnerability) and CVE-2021-45467 (a file inclusion vulnerability) are interesting individually, but they provide a powerful attack vector when chained together to achieve pre-authentication remote code execution (RCE) on a vulnerable target. Taking into account the 200k+ unique, public-facing servers currently running CWP, there could be many systems at risk of exploitation.

The maintainers of CWP have patched CVE-2021-45467 in the most recent release (v0.9.8.1122), with the guidance for administrators of CWP installations to upgrade to this version as soon as possible. No interim mitigation strategies have been shared.

How to find Control Web Panel (CWP) instances with runZero

From the Asset Inventory, use the following pre-built query to locate potentially vulnerable Control Web Panel instances within your network:

service.product:"CentOS Web Panel"
Find CWP instances

Please note that though the older product name is used in the query, the underlying match logic is using the web server value found in HTTP header responses from the CWP server, which has remained the same across the product name change.

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory [queries]/docs/search-query-list/).

Get runZero for free

Find Control Web Panel instances on your network in minutes with runZero.

Get started
Rumble Screenshot

Similar Content

September 30, 2022

Finding Microsoft Exchange Servers on your network

GTSC, a Vietnamese security firm, recently discovered two zero-day vulnerabilities that affect Microsoft Exchange Server 2013, 2016, and 2019. These two vulnerabilities are being tracked as CVE-2022-41040 and CVE-2022-41082.

August 4, 2022

Finding DrayTek Vigor routers

The Trellix Threat Labs Vulnerability Research team recently published vulnerability details affecting almost 30 models of DrayTek Vigor routers. This vulnerability resides in the management interface login page and is trivial to exploit via buffer overflow. An …

Read More

July 29, 2022

Hunting for X.509 Certificates

X.509 certificates are used to secure communications over both trusted and untrusted networks. Protocols such as Transport Layer Security (TLS) rely on X.509 certificates to keep their communications secure between endpoints. Each X.509 certificate is composed of a public …

Read More