#VU29327 SQL injection in CentOS Web Panel
Published: June 26, 2020
Vulnerability identifier: #VU29327
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
CentOS Web Panel
CentOS Web Panel
Software vendor:
CentOS Web Panel
CentOS Web Panel
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "status" parameter in "ajax_list_accounts.php". A remote attacker can send a specially crafted request to the affected application and gain access to sensitive information on the target system.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.