myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
References
Link | Resource |
---|---|
https://github.com/myvesta/vesta/releases/tag/0.9.8-26-43 | Third Party Advisory |
https://www.exploit-db.com/exploits/49674 | Exploit Third Party Advisory VDB Entry |
https://github.com/myvesta/vesta/commit/7991753ab7c5c568768028fb77554db8ea149f17 | Patch Third Party Advisory |
https://github.com/serghey-rodin/vesta/commit/a4e4542a6d1351c2857b169f8621dd9a13a2e896 | Patch Third Party Advisory |
https://blog.talosintelligence.com/2021/06/necro-python-bot-adds-new-tricks.html | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-10-24 07:15
Updated : 2022-10-25 07:43
NVD link : CVE-2021-46850
Mitre link : CVE-2021-46850
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
vestacp
- vesta_control_panel
- control_panel