Vulnerability CVE-2020-10966


Published: 2020-03-25   Modified: 2020-03-26

Description:
In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account takeover because the victim receives a reset URL containing an attacker-controlled server name.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Vestacp -> Control panel 
Hestiacp -> Control panel 

 References:
https://github.com/hestiacp/hestiacp/issues/748
https://github.com/hestiacp/hestiacp/releases/tag/1.1.1
https://github.com/serghey-rodin/vesta/commit/c3c4de43d6701560f604ca7996f717b08e3d7d1d

Copyright 2024, cxsecurity.com

 

Back to Top