SolusVM – Reseller Panel Arbitrary Command Execution (R911-0179)

Type: Arbitrary Command Execution
Location: Remote
Impact: High
Product: SolusVM
Vulnerable Version: 1.16.10
Fixed Version: 1.16.11
CVE: -
R911: 0179
Date: 2015-06-13
By: RACK911 Labs

[B]Product Description:

Solus Virtual Manager (SolusVM) is a powerful GUI based VPS management system with full OpenVZ, Linux KVM, Xen Paravirtualization and Xen HVM support. SolusVM allows you and your clients to manage a VPS cluster with security & ease.

[B]Vulnerability Description:

Due to user input not being sanitized, it is possible for a malicious reseller to run arbitrary commands on the master node as the root user.


We have deemed this vulnerability to be rated as HIGH due to the fact that root access can be obtained.

[B]Vulnerable Version:

This vulnerability was tested against SolusVM 1.16.10 and is believed to exist in all versions prior to the fixed builds below.

[B]Fixed Version:

This vulnerability was patched in SolusVM 1.16.11.

[B]Vendor Contact Timeline:

2015-06-10: Vendor contacted via email.
2015-06-10: Vendor confirms vulnerability.
2015-06-11: Vendor issues updates to all builds.
2015-06-13: RACK911 Labs issues security advisory.