Vestacp Control Panel 0.9.8-21

CPE Details

Vestacp Control Panel 0.9.8-21
0.9.8-21
2019-03-11
14h52 +00:00
2019-03-11
14h52 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:vestacp:control_panel:0.9.8-21:*:*:*:*:*:*:*

Informations

Vendor

vestacp

Product

control_panel

Version

0.9.8-21

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-3967 2022-11-13 00h00 +00:00 A vulnerability, which was classified as critical, was found in Vesta Control Panel. Affected is an unknown function of the file func/main.sh of the component sed Handler. The manipulation leads to argument injection. An attack has to be approached locally. The name of the patch is 39561c32c12cabe563de48cc96eccb9e2c655e25. It is recommended to apply a patch to fix this issue. VDB-213546 is the identifier assigned to this vulnerability.
7.8
High
CVE-2021-46850 2022-10-23 22h00 +00:00 myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
7.2
High
CVE-2021-30463 2021-04-08 11h54 +00:00 VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
7.8
High
CVE-2020-10966 2020-03-25 21h50 +00:00 In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account takeover because the victim receives a reset URL containing an attacker-controlled server name.
6.5
Medium
CVE-2018-18547 2018-10-24 19h00 +00:00 Vesta Control Panel through 0.9.8-22 has XSS via the edit/web/ domain parameter, the list/backup/ backup parameter, the list/rrd/ period parameter, the list/directory/ dir_a parameter, or the filename to the list/directory/ URI.
6.1
Medium