CVE-2021-30463
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
08/04/2021
Last modified:
14/04/2021
Description
VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vestacp:control_panel:*:*:*:*:*:*:*:* | 0.9.8-24 (including) |
To consult the complete list of CPE names with products and versions, see this page



