First published: Tue Mar 13 2018(Updated: )
Ajenti version version 2 contains a Cross ite Request Forgery (CSRF) vulnerability in the command execution panel of the tool used to manage the server. that can result in Code execution on the server . This attack appear to be exploitable via Being a CSRF, victim interaction is needed, when the victim access the infected trigger of the CSRF any code that match the victim privledges on the server can be executed..
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000082 is classified as a high severity vulnerability due to potential code execution on the server.
To fix CVE-2018-1000082, update Ajenti to the latest version that addresses the CSRF vulnerability.
CVE-2018-1000082 allows an attacker to execute arbitrary commands on the server through Cross-Site Request Forgery.
CVE-2018-1000082 affects users of Ajenti version 2 who have not implemented mitigations against CSRF attacks.
Yes, exploitation of CVE-2018-1000082 requires victim interaction to trigger the CSRF attack.