RSS   Podatności dla 'Ispconfig'   RSS

2021-01-05
 
CVE-2021-3021

CWE-89
 

 
ISPConfig before 3.2.2 allows SQL injection.

 
2020-02-25
 
CVE-2020-9398

CWE-89
 

 
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.

 
2020-02-07
 
CVE-2013-3629

NVD-CWE-Other
 

 
ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution

 
2020-01-23
 
CVE-2012-2087

CWE-732
 

 
ISPConfig 3.0.4.3: the "Add new Webdav user" can chmod and chown entire server from client interface.

 
2018-10-04
 
CVE-2018-17984

CWE-185
 

 
An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. This is exploitable by authenticated users who have local filesystem access.

 
2017-12-07
 
CVE-2017-17384

CWE-269
 

 
ISPConfig 3.x before 3.1.9 allows remote authenticated users to obtain root access by creating a crafted cron job.

 
2015-06-15
 
CVE-2015-4119

CWE-352
 

 
Multiple cross-site request forgery (CSRF) vulnerabilities in ISPConfig before 3.0.5.4p7 allow remote attackers to hijack the authentication of (1) administrators for requests that create an administrator account via a request to admin/users_edit.php or (2) arbitrary users for requests that conduct SQL injection attacks via the server parameter to monitor/show_sys_state.php.

 
 
CVE-2015-4118

CWE-89
 

 
SQL injection vulnerability in monitor/show_sys_state.php in ISPConfig before 3.0.5.4p7 allows remote authenticated users with monitor permissions to execute arbitrary SQL commands via the server parameter. NOTE: this can be leveraged by remote attackers using CVE-2015-4119.2.

 
2006-06-15
 
CVE-2006-3042

CWE-Other
 

 
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in ISPConfig 2.2.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) go_info[isp][classes_root] parameter in (a) server.inc.php, and the (2) go_info[server][classes_root] parameter in (b) app.inc.php, (c) login.php, and (d) trylogin.php. NOTE: this issue has been disputed by the vendor, who states that the original researcher "reviewed the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared ... is created by the installer."

 
2006-05-11
 
CVE-2006-2315

CWE-94
 

 
** DISPUTED ** PHP remote file inclusion vulnerability in session.inc.php in ISPConfig 2.2.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the go_info[server][classes_root] parameter. NOTE: the vendor has disputed this vulnerability, saying that session.inc.php is not under the web root in version 2.2, and register_globals is not enabled.

 


Copyright 2024, cxsecurity.com

 

Back to Top