{ "Name": "Panabit Panalog sy_query.php RCE", "Description": "

Panalog is a log audit system, which is convenient for users to centrally monitor and manage massive Panabit devices on the network.

Panalog log audit system sy_query.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.

", "Product": "Panalog", "Homepage": "https://www.panabit.com/", "DisclosureDate": "2021-10-20", "Author": "1291904552@qq.com", "FofaQuery": "app=\"Panabit-Panalog\"||app=\"Panabit-Panalog日志系统\"", "GobyQuery": "app=\"Panabit-Panalog\"||app=\"Panabit-Panalog日志系统\"", "Level": "2", "Impact": "

Panalog log audit system sy_query.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.

", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://www.panabit.com/

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

", "Translation": { "CN": { "Name": "Panalog 日志审计系统 sy_query.php 文件存在远程代码执行漏洞", "Product": "Panalog", "VulType": ["代码执行"], "Tags": ["代码执行"], "Description": "

Panalog是一款日志审计系统,方便用户统一集中监控、管理在网的海量设备。

Panalog日志审计系统 sy_query.php文件存在远程代码执行漏洞,攻击者可执行任意命令,接管服务器权限。

", "Impact": "

Panalog日志审计系统 sy_query.php文件存在远程代码执行漏洞,攻击者可执行任意命令,接管服务器权限。

", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新: https://www.panabit.com

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

" }, "EN": { "Name": "Panabit Panalog sy_query.php RCE", "Product": "Panalog", "VulType": ["rce"], "Tags": ["rce"], "Description": "

Panalog is a log audit system, which is convenient for users to centrally monitor and manage massive Panabit devices on the network.

Panalog log audit system sy_query.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.

", "Impact": "

Panalog log audit system sy_query.php file has a remote command execution vulnerability. Attackers can execute arbitrary commands to take over server permissions.

", "Recommendation": "

There is currently no detailed solution provided, please pay attention to the manufacturer's homepage update: https://www.panabit.com

1. Set access policies and whitelist access through security devices such as firewalls.

2. If not necessary, prohibit public network access to the system.

" } }, "References": [ "https://fofa.so" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "id" } ], "ExpTips": null, "ScanSteps": null, "Tags": [ "rce" ], "VulType": [ "rce" ], "CVEIDs": [ "" ], "CVSSScore": "8.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": ["Panalog"], "Hardware": null }, "CNNVD": [ "" ], "CNVD": [ "" ] }