#VU29327 SQL injection in CentOS Web Panel 

 

#VU29327 SQL injection in CentOS Web Panel

Published: June 26, 2020


Vulnerability identifier: #VU29327
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
CentOS Web Panel
Software vendor:
CentOS Web Panel

Description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in the "status" parameter in "ajax_list_accounts.php". A remote attacker can send a specially crafted request to the affected application and gain access to sensitive information on the target system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links