First published: Tue Mar 13 2018(Updated: )
Ajenti version version 2 contains a Input Validation vulnerability in ID string on Get-values POST request that can result in Server Crashing. This attack appear to be exploitable via An attacker can freeze te server by sending a giant string to the ID parameter ..
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000081 is classified as a high-severity vulnerability due to its potential to cause server crashes.
To fix CVE-2018-1000081, upgrade Ajenti to the latest version or implement input validation to restrict the length of the ID parameter.
CVE-2018-1000081 is an input validation vulnerability that can lead to server freezing.
Users of Ajenti version 2 are affected by CVE-2018-1000081.
An attacker can exploit CVE-2018-1000081 by sending a large string to the ID parameter, causing the server to crash.