Vulnerability CVE-2020-10808


Published: 2020-03-22

Description:
Vesta Control Panel (VestaCP) through 0.9.8-26 allows Command Injection via the schedule/backup Backup Listing Endpoint. The attacker must be able to create a crafted filename on the server, as demonstrated by an FTP session that renames .bash_logout to a .bash_logout' substring followed by shell metacharacters.

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Vestacp -> Vesta control panel 

 References:
https://forum.vestacp.com/viewforum.php?f=25
https://github.com/rapid7/metasploit-framework/pull/13094
https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/

Copyright 2024, cxsecurity.com

 

Back to Top