| ID |
CVE-2020-10808
|
| Sažetak |
Vesta Control Panel (VestaCP) through 0.9.8-26 allows Command Injection via the schedule/backup Backup Listing Endpoint. The attacker must be able to create a crafted filename on the server, as demonstrated by an FTP session that renames .bash_logout to a .bash_logout' substring followed by shell metacharacters. |
| Reference |
|
| CVSS |
| Base: | 9.0 |
| Impact: | 10.0 |
| Exploitability: | 8.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
SINGLE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
03-02-2023 - 19:29 |
| Objavljeno |
22-03-2020 - 17:15 |