CVE-2018-1000083

Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ajenti:ajenti:2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeeeĀ - Exploit, Third Party Advisory () https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeeeĀ - Exploit, Third Party Advisory

Information

Published : 2018-03-13 15:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-1000083

Mitre link : CVE-2018-1000083

CVE.ORG link : CVE-2018-1000083


JSON object : View

Products Affected

ajenti

  • ajenti
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')