Vulnerability Description
ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privileged users to execute arbitrary commands as root. This flaw enables local attackers with shell access to escalate privileges by writing a payload to a writable directory and executing it via zsudo. The vulnerability is particularly impactful in post-exploitation scenarios following web server compromise, where the attacker inherits access to zsudo.
Related Weaknesses (CWE)
References
- https://github.com/zpanel/zpanelx
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/26451
- https://www.vulncheck.com/advisories/zpanel-zsudo-local-priv-esc
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/26451
FAQ
What is CVE-2013-10052?
CVE-2013-10052 is a documented vulnerability. ZPanel includes a helper binary named zsudo, intended to allow restricted privilege escalation for administrative tasks. However, when misconfigured in /etc/sudoers, zsudo can be invoked by low-privil...
How severe is CVE-2013-10052?
CVSS scoring is not yet available for CVE-2013-10052. Check NVD for updates.
Is there a patch for CVE-2013-10052?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.