Vulnerabilities
Vulnerable Software
Vestacp:  Security Vulnerabilities
A vulnerability, which was classified as critical, was found in Vesta Control Panel. Affected is an unknown function of the file func/main.sh of the component sed Handler. The manipulation leads to argument injection. An attack has to be approached locally. The name of the patch is 39561c32c12cabe563de48cc96eccb9e2c655e25. It is recommended to apply a patch to fix this issue. VDB-213546 is the identifier assigned to this vulnerability.
CVSS Score
5.3
EPSS Score
0.0
Published
2022-11-13
myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
CVSS Score
7.2
EPSS Score
0.155
Published
2022-10-24
Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the generate_response function at /web/api/v1/upload/UploadHandler.php.
CVSS Score
6.1
EPSS Score
0.001
Published
2022-07-19
Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the body function at /web/api/v1/upload/UploadHandler.php.
CVSS Score
6.1
EPSS Score
0.001
Published
2022-07-19
Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the post function at /web/api/v1/upload/UploadHandler.php.
CVSS Score
6.1
EPSS Score
0.001
Published
2022-07-19
Vesta v1.0.0-5 was discovered to contain a cross-site scripting (XSS) vulnerability via the handle_file_upload function at /web/api/v1/upload/UploadHandler.php.
CVSS Score
6.1
EPSS Score
0.001
Published
2022-07-19
vesta 0.9.8-24 is affected by a file inclusion vulnerability in file web/add/user/index.php.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-11-29
VestaCP through 0.9.8-24 allows the admin user to escalate privileges to root because the Sudo configuration does not require a password to run /usr/local/vesta/bin scripts.
CVSS Score
7.2
EPSS Score
0.005
Published
2021-04-08
VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
CVSS Score
7.8
EPSS Score
0.001
Published
2021-04-08
web/upload/UploadHandler.php in Vesta Control Panel (aka VestaCP) through 0.9.8-27 and myVesta through 0.9.8-26-39 allows uploads from a different origin.
CVSS Score
8.8
EPSS Score
0.033
Published
2021-03-15


Contact Us

Shodan ® - All rights reserved