Show plain JSON{"id": "CVE-2019-9859", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2020-03-10T13:15:12.657", "references": [{"url": "https://ssd-disclosure.com/?p=3926", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://ssd-disclosure.com/?p=3926", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "Vesta Control Panel (VestaCP) 0.9.7 through 0.9.8-23 is vulnerable to an authenticated command execution that can result in remote root access on the server. The platform works with PHP as the frontend language and uses shell scripts to execute system actions. PHP executes shell script through the dangerous command exec. This function can be dangerous if arguments passed to it are not filtered. Every user input in VestaCP that is used as an argument is filtered with the escapeshellarg function. This function comes from the PHP library directly and its description is as follows: \"escapeshellarg() adds single quotes around a string and quotes/escapes any existing single quotes allowing you to pass a string directly to a shell function and having it be treated as a single safe argument.\" It means that if you give Username, it will have 'Username' as a replacement. This works well and protects users from exploiting this potentially dangerous exec function. Unfortunately, VestaCP uses this escapeshellarg function incorrectly in several places."}, {"lang": "es", "value": "Vesta Control Panel (VestaCP) versiones 0.9.7 hasta 0.9.8-23 es vulnerable a una ejecuci\u00f3n de comando autenticada que puede resultar en un acceso remoto a la root en el servidor. La plataforma funciona con PHP como lenguaje frontend y usa scripts de shell para ejecutar acciones del sistema. PHP ejecuta script de shell por medio del peligroso comando exec. Esta funci\u00f3n puede ser peligrosa si los argumentos pasados no son filtrados. Cada entrada de usuario en VestaCP que se utiliza como argumento es filtrada con la funci\u00f3n escapeshellarg. Esta funci\u00f3n proviene directamente de la biblioteca PHP y su descripci\u00f3n es la siguiente: \"escapeshellarg() agrega comillas simples alrededor de una cadena y cita/escapa a las comillas simples existentes permitiendo pasar una cadena directamente a una funci\u00f3n de shell y hacer que se trate como un \u00fanico argumento seguro\". Quiere decir, que si le da nombre de usuario, tendr\u00e1 \"Username\" como reemplazo. Esto opera bien y protege a usuarios de explotar esta funci\u00f3n exec peligrosa potencialmente. Desafortunadamente, VestaCP utiliza esta funci\u00f3n escapeshellarg incorrectamente en varios lugares."}], "lastModified": "2024-11-21T04:52:27.237", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vestacp:vesta_control_panel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77F99639-43D5-4D4C-B3E1-35543B48566E", "versionEndIncluding": "0.9.8-23", "versionStartIncluding": "0.9.7-0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}