Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

New exploit vestacp_exec

General questions about VestaCP
Post Reply
  • Print view
Advanced search
4 posts • Page 1 of 1
dimahna
Posts: 7
Joined: Tue Aug 29, 2017 11:16 am

New exploit vestacp_exec
  • Quote

Post by dimahna » Tue Apr 14, 2020 5:12 pm

hello
SOS any fix for this exploit
https://packetstormsecurity.com/files/1 ... xec.rb.txt
Top

ScIT
Support team
Posts: 617
Joined: Mon Feb 23, 2015 4:13 pm

Os: Ubuntu 17x
Web: apache + nginx
Re: New exploit vestacp_exec
  • Quote

Post by ScIT » Wed Apr 15, 2020 8:08 pm

Basicly, dpeca has already patched the issues on github, but Serghey seems to be offline since a long time - he's the only one who can publish a new version to the repository.

Disclaimer: I stopped any work on vesta due to my work on my own fork - just want that users are aware of the possible fixes of the current exploits.

viewtopic.php?f=10&t=19714
Top

hasoid
Posts: 4
Joined: Fri Apr 24, 2020 10:52 am

Os: Debian 8x
Web: nginx + php-fpm
Re: New exploit vestacp_exec
  • Quote

Post by hasoid » Sat Apr 25, 2020 8:05 am

I see video for this exploit. I think to use this exploit you must have on server user account and ftp service. It correct? If yes - no problem for single-user server.
Top

ScIT
Support team
Posts: 617
Joined: Mon Feb 23, 2015 4:13 pm

Os: Ubuntu 17x
Web: apache + nginx
Re: New exploit vestacp_exec
  • Quote

Post by ScIT » Sat Apr 25, 2020 8:09 am

Then there is a second exploit, which allows you to overwrite the link in password reset mail, combine this two exploits and a bit luck (or blindness of an user) and you're in...
Top


Post Reply
  • Print view

4 posts • Page 1 of 1

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password