#VU26297 Command Injection in Vesta Control Panel


Published: 2020-04-07 | Updated: 2020-04-14

Vulnerability identifier: #VU26297

Vulnerability risk: Medium

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C]

CVE-ID: CVE-2020-10808

CWE-ID: CWE-77

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Vesta Control Panel
Web applications / Remote management & hosting panels

Vendor: Vesta Control Panel

Description

The vulnerability allows a remote user to execute arbitrary commands with elevated privileges.

The vulnerability exists due to insufficient filtration of user-supplied data in schedule/backup Backup Listing Endpoint. A remote user with ability to create a specially crafted filename on the server  can execute arbitrary system commands with elevated privileges on the system.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Vesta Control Panel: 0.9.8-1 - 0.9.8-26


External links
http://github.com/rapid7/metasploit-framework/pull/13094
http://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability