A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form.
References
Link | Resource |
---|---|
https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ | Exploit Third Party Advisory |
https://github.com/serghey-rodin/vesta/issues/1921 | Third Party Advisory |
https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ | Exploit Third Party Advisory |
https://github.com/serghey-rodin/vesta/issues/1921 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ - Exploit, Third Party Advisory | |
References | () https://github.com/serghey-rodin/vesta/issues/1921 - Third Party Advisory |
Information
Published : 2019-08-15 21:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12791
Mitre link : CVE-2019-12791
CVE.ORG link : CVE-2019-12791
JSON object : View
Products Affected
vestacp
- control_panel
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')