VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-17388 VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:32:41.087Z

Reserved: 2021-04-08T00:00:00

Link: CVE-2021-30463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-08T14:15:14.277

Modified: 2024-11-21T06:03:58.300

Link: CVE-2021-30463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses