vendor:
VestaCP
by:
Numan Türle
8.8
CVSS
HIGH
Stored XSS
79
CWE
Product Name: VestaCP
Affected Version From: 0.9.8-26-43
Affected Version To: 0.9.8-26
Patch Exists: YES
Related CWE: N/A
CPE: a:vestacp:vestacp:0.9.8-26-43
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: VestaCP
2021
VestaCP 0.9.8 – ‘v_interface’ Add IP Stored XSS
VestaCP 0.9.8 is vulnerable to stored XSS in the 'v_interface' parameter of the 'add/ip/' POST request. An attacker can inject malicious JavaScript code into the 'v_interface' parameter, which will be executed when the user visits the 'add/ip/' page.
Mitigation:
Input validation should be used to prevent malicious code from being injected into the 'v_interface' parameter. Additionally, the application should be updated to the latest version of VestaCP.