CVE-2019-12791

A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vestacp:control_panel:0.9.8-24:*:*:*:*:*:*:*

History

21 Nov 2024, 04:23

Type Values Removed Values Added
References () https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ - Exploit, Third Party Advisory () https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ - Exploit, Third Party Advisory
References () https://github.com/serghey-rodin/vesta/issues/1921 - Third Party Advisory () https://github.com/serghey-rodin/vesta/issues/1921 - Third Party Advisory

Information

Published : 2019-08-15 21:15

Updated : 2024-11-21 04:23


NVD link : CVE-2019-12791

Mitre link : CVE-2019-12791

CVE.ORG link : CVE-2019-12791


JSON object : View

Products Affected

vestacp

  • control_panel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')