A directory traversal vulnerability in the v-list-user script in Vesta Control Panel 0.9.8-24 allows remote attackers to escalate from regular registered users to root via the password reset form.
References
Link | Resource |
---|---|
https://github.com/serghey-rodin/vesta/issues/1921 | Third Party Advisory |
https://cardaci.xyz/advisories/2019/08/12/vesta-control-panel-0.9.8-24-privilege-escalation-in-the-password-reset-form/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-08-15 14:15
Updated : 2019-08-28 09:50
NVD link : CVE-2019-12791
Mitre link : CVE-2019-12791
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
vestacp
- control_panel