Openlitespeed Web Server 1.7.8 - Privilege Escalation (CVE-2021-26758)
Openlitespeed Web Server 1.7.8 - Command Injection to Privilege Escalation (CVE-2021-26758)
Last updated
Openlitespeed Web Server 1.7.8 - Command Injection to Privilege Escalation (CVE-2021-26758)
Last updated
OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system. The path
parameter has command injection vulnerability that leads to escalate privilege. OpenLiteSpeed (1.7.8) web server runs with user(nobody):group(nogroup)
privilege. However, extUser
and extGroup
parameters could be used to join a group (GID) such as shadow, sudo, etc.
I found a way to escalate privileges on Ubuntu 18.04 via OpenLiteSpeed web server that runs with user(nobody):group(nogroup)
privilege . According to this vulnerability , system user that has admin panel credentials can add himself to sudo group or shadow group( to read /etc/shadow file) . So that the user can execute command with high privileges.
Command injection vulnerability is discovered by cmOs - SunCSR
Assuming that there is a test user that is not member of sudo group.
User changes External App configuration as following to get reverse shell with high privileges.
The user sends a Graceful Restart request through admin panel and get reverse shell with sudo group privileges.