header-logo
Suggest Exploit
vendor:
Ajenti
by:
Numan OZDEMIR
6.1
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: Ajenti
Affected Version From: 1.2.23.13
Affected Version To: 1.2.23.13
Patch Exists: YES
Related CWE: CVE-2018-18548
CPE: ajenti:ajenti
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2018

AjentiCP 1.2.23.13 – Cross-Site Scripting

Attacker can inject JavaScript codes without Ajenti privileges by this vulnerabillity. Normally an attacker cant intervene to Ajenti without Ajenti privileges. But with this vulnerability, if attacker can create a folder (may be by a web app vulnerability) he can run bad-purposed JavaScript codes on Ajenti user's browser, while the user using File Manager tool.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Title: AjentiCP 1.2.23.13 - Cross-Site Scripting
# Author: Numan OZDEMIR (https://infinitumit.com.tr)
# Vendor Homepage: ajenti.org
# Software Link: https://github.com/ajenti/ajenti
# Version: Up to v1.2.23.13
# CVE: CVE-2018-18548

# Description:

# Attacker can inject JavaScript codes without Ajenti privileges by this
# vulnerabillity.
# Normally an attacker cant intervene to Ajenti without Ajenti privileges.
# But with this vulnerability, if attacker can create a folder (may be by
# a web app vulnerability) he can run
# bad-purposed JavaScript codes on Ajenti user's browser, while the user
# using File Manager tool.
# So this vulnerability makes high risk.

# How to Reproduce:
1)- Create a directory as named xss payload. Like, im<img src onerror=alert(1337)>dir
2)- Open this directory in File Manager tool in Ajenti server admin panel.