Vulnerability identifier: #VU26297
Vulnerability risk: Medium
CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID:
CWE-ID:
CWE-77
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
Vesta Control Panel
Web applications /
Remote management & hosting panels
Vendor: Vesta Control Panel
Description
The vulnerability allows a remote user to execute arbitrary commands with elevated privileges.
The vulnerability exists due to insufficient filtration of user-supplied data in schedule/backup Backup Listing Endpoint. A remote user with ability to create a specially crafted filename on the server can execute arbitrary system commands with elevated privileges on the system.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
Vesta Control Panel: 0.9.8-1 - 0.9.8-26
External links
https://github.com/rapid7/metasploit-framework/pull/13094
https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.