CVE-2020-15620
Summary
| CVE | CVE-2020-15620 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-28 17:15:00 UTC |
| Updated | 2023-01-24 18:57:00 UTC |
| Description | This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the id parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9741. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Centos-webpanel | Centos Web Panel | 0.9.8.923 | All | All | All |
| Application | Centos-webpanel | Centos Web Panel | 0.9.8.923 | All | All | All |
| Application | Control-webpanel | Webpanel | 0.9.8.923 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ZDI-20-767 | Zero Day Initiative | N/A | www.zerodayinitiative.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.