CVE-2024-5960

9.8 CRITICAL

📋 TL;DR

CVE-2024-5960 is a plaintext password storage vulnerability in Eliz Software Panel that allows attackers to access stored credentials. This affects all Panel installations before version 2.3.24, potentially exposing administrative credentials to unauthorized users.

💻 Affected Systems

Products:
  • Eliz Software Panel
Versions: All versions before v2.3.24
Operating Systems: Any OS running Eliz Software Panel
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in how credentials are stored within the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft leading to administrative access, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to the Panel interface, configuration changes, and potential privilege escalation within the affected system.

🟢

If Mitigated

Limited impact if strong network segmentation, access controls, and monitoring are in place to detect credential access attempts.

🌐 Internet-Facing: HIGH - Internet-facing panels expose credentials directly to attackers who can access the storage location.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could access stored credentials for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the credential storage location, which may require some level of system access. The vulnerability is straightforward to exploit once the storage location is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.3.24

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-1497

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download v2.3.24 from official Eliz Software sources. 3. Stop the Panel service. 4. Install the update following vendor instructions. 5. Restart the Panel service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict File Access

linux

Apply strict file permissions to prevent unauthorized access to credential storage files

chmod 600 /path/to/panel/credential/files
chown panel:panel /path/to/panel/credential/files

Network Segmentation

all

Isolate Panel instances from untrusted networks and limit access to authorized IPs only

🧯 If You Can't Patch

  • Implement strict access controls and monitoring on credential storage locations
  • Deploy application firewalls and network segmentation to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check Panel version in administration interface or configuration files. Versions below 2.3.24 are vulnerable.

Check Version:

Check Panel web interface or configuration files for version information

Verify Fix Applied:

Confirm version is 2.3.24 or higher and check that credentials are no longer stored in plaintext format.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to credential storage files
  • Multiple failed login attempts to Panel interface
  • Unusual administrative activity

Network Indicators:

  • Unexpected connections to Panel administration ports
  • Traffic patterns indicating credential harvesting

SIEM Query:

source="panel_logs" AND (event="file_access" AND file_path="*credential*") OR (event="auth_failure" AND count>5)

🔗 References

📤 Share & Export