vendor:
Vesta Control Panel
by:
Jaka Hudoklin
7,2
CVSS
HIGH
Command Injection
78
CWE
Product Name: Vesta Control Panel
Affected Version From: 0.9.7
Affected Version To: 0.9.8-16
Patch Exists: YES
Related CWE: N/A
CPE: a:vestacp:vesta_control_panel
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2018
Vesta Control Panel 0.9.7 <= 0.9.8-16 Local Privilege Escalation Exploit
Vesta CP default install script adds /usr/local/vesta/bin/ directory into /etc/sudoers.d with the NOPASSWD option for the default 'admin' user. All programs in /usr/local/vesta/bin/ directory can therefore be run as root. A command injection vulnerability in 'v-get-web-domain-value' script can be exploited to run arbitrary commands and escalate from admin user to root. Parameter $3 (key) in v-get-web-domain-value is not properly sanitized before being passed to bash eval.
Mitigation:
Ensure that all user input is properly sanitized before being passed to bash eval.