Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-58p9-fwrr-259c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.

VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.

EPSS

Процентиль: 17%
0.00056
Низкий

Дефекты

CWE-59

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.

EPSS

Процентиль: 17%
0.00056
Низкий

Дефекты

CWE-59