logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-10808

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-10808

Description:
Vesta Control Panel (VestaCP) through 0.9.8-26 allows Command Injection via the schedule/backup Backup Listing Endpoint. The attacker must be able to create a crafted filename on the server, as demonstrated by an FTP session that renames .bash_logout to a .bash_logout' substring followed by shell metacharacters.
Last updated date:
02/03/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
04/06/2020
Reference url to background

https://pentest.blog/vesta-control-panel-second-order-remote-code-execution-0day-step-by-step-analysis/

Type:
exploit
Confidence:
HIGH
Date of publishing:
08/27/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/03/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/03/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy