myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/myvesta/vesta/releases/tag/0.9.8-26-43 | third party advisory |
https://github.com/myvesta/vesta/commit/7991753ab7c5c568768028fb77554db8ea149f17 | third party advisory patch |
https://github.com/serghey-rodin/vesta/commit/a4e4542a6d1351c2857b169f8621dd9a13a2e896 | third party advisory patch |
https://www.exploit-db.com/exploits/49674 | exploit vdb entry third party advisory |
https://blog.talosintelligence.com/2021/06/necro-python-bot-adds-new-tricks.html | exploit third party advisory technical description |