Command Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.
References
Link | Resource |
---|---|
https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/hestiacp/hestiacp/commit/d50f95cf208049dfb6ac67a8020802121745bd60 | Patch |
Configurations
History
30 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Command Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context. |
14 Feb 2024, 20:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
Information
Published : 2022-04-28 10:15
Updated : 2024-08-30 16:15
NVD link : CVE-2022-1509
Mitre link : CVE-2022-1509
JSON object : View
Products Affected
hestiacp
- control_panel
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')