An issue was discovered in Vesta Control Panel 0.9.8-20. There is Reflected XSS via $_REQUEST['path'] to the view/file/index.php URI, which can lead to remote PHP code execution via vectors involving a file_put_contents call in web/upload/UploadHandler.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://medium.com/%40ndrbasi/cve-2018-10686-vestacp-rce-d96d95c2bde2 | |
https://github.com/serghey-rodin/vesta/issues/1558 | third party advisory exploit |