An issue was discovered in HestiaCP before v1.3.5. Attackers are able to arbitrarily install packages due to values taken from the pgk [] parameter in the update request being transmitted to the operating system's package manager.
References
Link | Resource |
---|---|
https://github.com/hestiacp/hestiacp/commit/27556a9a43aeaf308b33be224c2e70f2011574e6 | Patch Third Party Advisory |
https://github.com/hestiacp/hestiacp/commit/9a1fccd37f2842fdf96ffb48895c4bfa9788c469 | Patch Third Party Advisory |
https://github.com/hestiacp/hestiacp/commit/27556a9a43aeaf308b33be224c2e70f2011574e6 | Patch Third Party Advisory |
https://github.com/hestiacp/hestiacp/commit/9a1fccd37f2842fdf96ffb48895c4bfa9788c469 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hestiacp/hestiacp/commit/27556a9a43aeaf308b33be224c2e70f2011574e6 - Patch, Third Party Advisory | |
References | () https://github.com/hestiacp/hestiacp/commit/9a1fccd37f2842fdf96ffb48895c4bfa9788c469 - Patch, Third Party Advisory |
Information
Published : 2022-08-18 05:15
Updated : 2024-11-21 06:03
NVD link : CVE-2021-30070
Mitre link : CVE-2021-30070
CVE.ORG link : CVE-2021-30070
JSON object : View
Products Affected
hestiacp
- hestiacp
CWE