RSS   Vulnerabilities for 'Control panel'   RSS

2021-04-08
 
CVE-2021-30463

CWE-59
 

 
VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.

 
2020-03-25
 
CVE-2020-10966

CWE-200
 

 
In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account takeover because the victim receives a reset URL containing an attacker-controlled server name.

 
2019-08-15
 
CVE-2019-12792

CWE-77
 

 
A command injection vulnerability in UploadHandler.php in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root.

 
 
CVE-2019-12791

CWE-22
 

 
A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form.

 
2019-04-19
 
CVE-2019-9841

CWE-79
 

 
Vesta Control Panel 0.9.8-23 allows XSS via a crafted URL.

 
2018-10-24
 
CVE-2018-18547

CWE-79
 

 
Vesta Control Panel through 0.9.8-22 has XSS via the edit/web/ domain parameter, the list/backup/ backup parameter, the list/rrd/ period parameter, the list/directory/ dir_a parameter, or the filename to the list/directory/ URI.

 
2018-05-06
 
CVE-2018-10686

CWE-79
 

 
An issue was discovered in Vesta Control Panel 0.9.8-20. There is Reflected XSS via $_REQUEST['path'] to the view/file/index.php URI, which can lead to remote PHP code execution via vectors involving a file_put_contents call in web/upload/UploadHandler.php.

 

 >>> Vendor: Vestacp 2 Products
Control panel
Vesta control panel


Copyright 2024, cxsecurity.com

 

Back to Top